RHEL 2.1 : sendmail (RHSA-2003:121)

Critical Nessus Plugin ID 12385


The remote Red Hat host is missing one or more security updates.


Updated Sendmail packages are available to fix a vulnerability that allows local and possibly remote attackers to gain root privileges.

Sendmail is a widely used Mail Transport Agent (MTA) which is included in all Red Hat Enterprise Linux distributions.

There is a vulnerability in Sendmail versions 8.12.8 and prior. The address parser performs insufficient bounds checking in certain conditions due to a char to int conversion, making it possible for an attacker to take control of the application. Although no exploit currently exists, this issue is probably locally exploitable and may be remotely exploitable.

All users are advised to update to these erratum packages containing a backported patch which corrects these vulnerabilities.

Red Hat would like to thank Michal Zalewski for finding and reporting this issue.


Update the affected packages.

See Also



Plugin Details

Severity: Critical

ID: 12385

File Name: redhat-RHSA-2003-121.nasl

Version: $Revision: 1.21 $

Type: local

Agent: unix

Published: 2004/07/06

Modified: 2016/12/28

Dependencies: 12634

Risk Information

Risk Factor: Critical


Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:sendmail, p-cpe:/a:redhat:enterprise_linux:sendmail-cf, p-cpe:/a:redhat:enterprise_linux:sendmail-devel, p-cpe:/a:redhat:enterprise_linux:sendmail-doc, cpe:/o:redhat:enterprise_linux:2.1

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 2003/03/31

Reference Information

CVE: CVE-2003-0161

RHSA: 2003:121