SUSE-SA:2003:035: sendmail

medium Nessus Plugin ID 13803

Synopsis

The remote host is missing a vendor-supplied security patch

Description

The remote host is missing the patch for the advisory SUSE-SA:2003:035 (sendmail).


The well known and widely used MTA sendmail is vulnerable to a remote denial-of-service attack in version 8.12.8 and earlier (but not before 8.12). The bug exists in the DNS map code. This feature is enabled by specifying FEATURE(`enhdnsbl').
When sendmail receives an invalid DNS response it tries to call free(3) on random data which results in a process crash.

After your system was updated you have to restart your sendmail daemon to make the update effective.

There is no known workaround for this vulnerability other than using a different MTA.

Please download the update package for your distribution and verify its integrity by the methods listed in section 3) of this announcement.
Then, install the package using the command 'rpm -Fhv file.rpm' to apply the update.

Solution

http://www.suse.de/security/2003_035_sendmail.html

Plugin Details

Severity: Medium

ID: 13803

File Name: suse_SA_2003_035.nasl

Version: 1.16

Agent: unix

Published: 7/25/2004

Updated: 1/14/2021

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

Required KB Items: Host/SuSE/rpm-list

Exploit Ease: No known exploits are available

Reference Information

CVE: CVE-2003-0688

BID: 8485