RHEL 2.1 / 3 / 4 : sendmail (RHSA-2006:0515)

Medium Nessus Plugin ID 21721

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

Updated sendmail packages are now available to fix a denial of service security issue.

This update has been rated as having important security impact by the Red Hat Security Response Team.

[Updated 27 June 2006] The sendmail-docs packages for Red Hat Enterprise Linux 3 have been updated to the correct version and release.

Sendmail is a Mail Transport Agent (MTA) used to send mail between machines.

A flaw in the handling of multi-part MIME messages was discovered in Sendmail. A remote attacker could create a carefully crafted message that could crash the sendmail process during delivery (CVE-2006-1173).
By default on Red Hat Enterprise Linux, Sendmail is configured to only accept connections from the local host. Therefore, only users who have configured Sendmail to listen to remote hosts would be remotely vulnerable to this issue.

Users of Sendmail are advised to upgrade to these erratum packages, which contain a backported patch from the Sendmail team to correct this issue.

Solution

Update the affected packages.

See Also

https://access.redhat.com/security/cve/cve-2006-1173

https://access.redhat.com/errata/RHSA-2006:0515

Plugin Details

Severity: Medium

ID: 21721

File Name: redhat-RHSA-2006-0515.nasl

Version: 1.19

Type: local

Agent: unix

Published: 2006/06/16

Updated: 2018/11/16

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:sendmail, p-cpe:/a:redhat:enterprise_linux:sendmail-cf, p-cpe:/a:redhat:enterprise_linux:sendmail-devel, p-cpe:/a:redhat:enterprise_linux:sendmail-doc, cpe:/o:redhat:enterprise_linux:2.1, cpe:/o:redhat:enterprise_linux:3, cpe:/o:redhat:enterprise_linux:4

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 2006/06/27

Reference Information

CVE: CVE-2006-1173

CERT: 146718

RHSA: 2006:0515