RHEL 2.1 / 3 / 4 : sendmail (RHSA-2006:0515)

This script is Copyright (C) 2006-2014 Tenable Network Security, Inc.


Synopsis :

The remote Red Hat host is missing one or more security updates.

Description :

Updated sendmail packages are now available to fix a denial of service
security issue.

This update has been rated as having important security impact by the
Red Hat Security Response Team.

[Updated 27 June 2006] The sendmail-docs packages for Red Hat
Enterprise Linux 3 have been updated to the correct version and
release.

Sendmail is a Mail Transport Agent (MTA) used to send mail between
machines.

A flaw in the handling of multi-part MIME messages was discovered in
Sendmail. A remote attacker could create a carefully crafted message
that could crash the sendmail process during delivery (CVE-2006-1173).
By default on Red Hat Enterprise Linux, Sendmail is configured to only
accept connections from the local host. Therefore, only users who have
configured Sendmail to listen to remote hosts would be remotely
vulnerable to this issue.

Users of Sendmail are advised to upgrade to these erratum packages,
which contain a backported patch from the Sendmail team to correct
this issue.

See also :

https://www.redhat.com/security/data/cve/CVE-2006-1173.html
http://rhn.redhat.com/errata/RHSA-2006-0515.html

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)

Family: Red Hat Local Security Checks

Nessus Plugin ID: 21721 ()

Bugtraq ID:

CVE ID: CVE-2006-1173