Lucene search

K
slackwareSlackware Linux ProjectSSA-2024-031-01
HistoryJan 31, 2024 - 9:25 p.m.

[slackware-security] sendmail

2024-01-3121:25:31
Slackware Linux Project
www.slackware.com
10
sendmail
slackware 15.0
security fix
smtp smuggling
remote attackers
vulnerability
update
installation instructions

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

7.4 High

AI Score

Confidence

Low

0.002 Low

EPSS

Percentile

54.7%

New sendmail packages are available for Slackware 15.0 and -current to
fix a security issue.

Here are the details from the Slackware 15.0 ChangeLog:

extra/sendmail/sendmail-8.18.1-i586-1_slack15.0.txz: Upgraded.
sendmail through 8.17.2 allows SMTP smuggling in certain configurations.
Remote attackers can use a published exploitation technique to inject e-mail
messages with a spoofed MAIL FROM address, allowing bypass of an SPF
protection mechanism. This occurs because sendmail supports <LF>.<CR><LF>
but some other popular e-mail servers do not. This is resolved in 8.18 and
later versions with ‘o’ in srv_features.
For more information, see:
https://vulners.com/cve/CVE-2023-51765
(* Security fix *)
extra/sendmail/sendmail-cf-8.18.1-noarch-1_slack15.0.txz: Upgraded.

Where to find the new packages:

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)

Also see the “Get Slack” section on http://slackware.com for
additional mirror sites near you.

Updated packages for Slackware 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/extra/sendmail/sendmail-8.18.1-i586-1_slack15.0.txz
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/extra/sendmail/sendmail-cf-8.18.1-noarch-1_slack15.0.txz

Updated packages for Slackware x86_64 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/extra/sendmail/sendmail-8.18.1-x86_64-1_slack15.0.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/extra/sendmail/sendmail-cf-8.18.1-noarch-1_slack15.0.txz

Updated packages for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/extra/sendmail/sendmail-8.18.1-i586-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-current/extra/sendmail/sendmail-cf-8.18.1-noarch-1.txz

Updated packages for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/extra/sendmail/sendmail-8.18.1-x86_64-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-current/extra/sendmail/sendmail-cf-8.18.1-noarch-1.txz

MD5 signatures:

Slackware 15.0 packages:
c3476bc08a89961b1bd85aa41fe0399e sendmail-8.18.1-i586-1_slack15.0.txz
da65abecc807b6af76f1f5f23545c426 sendmail-cf-8.18.1-noarch-1_slack15.0.txz

Slackware x86_64 15.0 packages:
bd5bb1d3ec4e26829eb59361ed1e46cb sendmail-8.18.1-x86_64-1_slack15.0.txz
716fb38618dc85bf5704fa33c1086d2b sendmail-cf-8.18.1-noarch-1_slack15.0.txz

Slackware -current packages:
e7b502527dfbc9050a4c78cdc266e408 sendmail-8.18.1-i586-1.txz
603bcf2ecc861ea275f002636c259c4c sendmail-cf-8.18.1-noarch-1.txz

Slackware x86_64 -current packages:
38c56928fa6feb1709c84405e60b6f72 sendmail-8.18.1-x86_64-1.txz
5fc24831c13249281202717e17e70bae sendmail-cf-8.18.1-noarch-1.txz

Installation instructions:

Upgrade the packages as root:
> upgradepkg sendmail-*.txz

Then, restart sendmail:
> sh /etc/rc.d/rc.sendmail restart

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

7.4 High

AI Score

Confidence

Low

0.002 Low

EPSS

Percentile

54.7%