Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here. |
Notices |
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
Are you new to LinuxQuestions.org? Visit the following links:
Site Howto |
Site FAQ |
Sitemap |
Register Now
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
|
 |
03-22-2006, 09:06 PM
|
#1
|
Member
Registered: Aug 2005
Location: Missouri, USA
Distribution: Gentoo
Posts: 161
Rep:
|
Security Flaw in Sendmail detected
Sorry if this has been posted already, I came across this article and thought I'd help spread the word to updgrade.
http://news.com.com/Sendmail+flaw+op...3-6052758.html
Again, I apologize if this has been posted
|
|
|
03-22-2006, 09:34 PM
|
#2
|
Senior Member
Registered: Dec 2005
Location: Brisbane, Australia
Distribution: Slackware64 14.0
Posts: 4,141
Rep: 
|
I haven't seen it reported here (until now  ) but the Sendmail mailing list notification of the availability of 8.13.6 is out and so is the Slackware Security mailing list's advisory for the new package.
Bugtraq also has notifications of updates for sendmail on FreeBSD and Suse (with others to follow I'm sure).
I only mention it as a plug for some sources of this kind of information...
|
|
|
03-22-2006, 09:42 PM
|
#3
|
Senior Member
Registered: Mar 2003
Distribution: Fedora
Posts: 3,658
Rep:
|
WARN: Critical Sendmail Vulnerability
ISS has identified a race condition in Sendmail that allows a remote attacker to execute arbitrary code with the privileges of the Sendmail user, often root. All Sendmail users are advised to immediately upgrade to version 8.13.6+. Thanks to justanothersteve for reporting this vuln.
Additional links:
http://www.securityfocus.com/bid/17192/discuss
http://www.sendmail.com/company/advi....shtml#exploit
|
|
|
03-23-2006, 02:33 AM
|
#4
|
Senior Member
Registered: Sep 2005
Location: Out
Posts: 3,307
Rep:
|
Maybe time to switch to postfix?
|
|
|
03-23-2006, 06:32 PM
|
#5
|
Member
Registered: Apr 2005
Location: Canada
Distribution: Slackware 12
Posts: 184
Rep:
|
Just found out about this, here's the CERT advisory.
|
|
|
04-04-2006, 01:45 AM
|
#6
|
Member
Registered: Mar 2005
Location: UK
Distribution: Slackware
Posts: 794
Rep:
|
Are these security advisories really that critical? Apparently this Sendmail problem doesn't have anything to do with normal sending/receiving email. It's to do with some very specific connection conditions.
|
|
|
04-04-2006, 09:08 AM
|
#7
|
Senior Member
Registered: Sep 2005
Location: Out
Posts: 3,307
Rep:
|
No its not critical it has just been rated 8/10 .. Could be 9 or 10
Btw sendmail.org is the original sendmail homepage. The .com have some patches to sendmail.org code.
"It's to do with some very specific connection conditions."
Very specific doesn't mean it can't be achieved, It's never good to minimize.
There is a remotely critical exploitable bug that doesn't need authentication.
There is a patch, you have to apply it. Easy
|
|
|
04-04-2006, 11:44 PM
|
#8
|
Senior Member
Registered: Mar 2003
Distribution: Fedora
Posts: 3,658
Rep:
|
Quote:
Originally Posted by simcox1
Are these security advisories really that critical? Apparently this Sendmail problem doesn't have anything to do with normal sending/receiving email. It's to do with some very specific connection conditions.
|
There is already PoC code available for this. Given that you'd be executing arbitrary code as root, that's pretty bad in my book. Secunia lists this as "highly critical" though I've seen it as "high" too. I certainly wouldn't want to have a vulnerable version running when it goes from PoC to exploit in wild.
|
|
|
04-09-2006, 10:36 AM
|
#9
|
Member
Registered: Jul 2005
Distribution: Debian, Ubuntu
Posts: 85
Rep:
|
Sendmail vulnerabilities ... Where have I heard that before? And, uh, yeah, any vulnerability that could potentially allow an attacker to root you is pretty bad. Race conditions aren't as critical as some might think, but they're still bad and especially bad with a highly popular MTA like sendmail.
|
|
|
04-09-2006, 03:25 PM
|
#10
|
Member
Registered: Mar 2005
Location: UK
Distribution: Slackware
Posts: 794
Rep:
|
I know it's important to keep up to date etc, and apply patches, but I wonder how critical some of the updates are. Sometimes all you're doing is fixing a bug while installing a new one.
|
|
|
05-09-2006, 04:16 PM
|
#11
|
Member
Registered: Sep 2003
Location: Toronto, Canada
Distribution: FreeBSD
Posts: 78
Rep:
|
I agree with nx5000, if you care about security whatsoever switch to postfix, or any other MTA for that matter that doesn't have near as many CERT advisories as Sendmail does.
Unless you are absolutely confident you understand sendmail configuration and macros, do not put sendmail on an internet accessible server.
|
|
|
All times are GMT -5. The time now is 12:32 PM.
|
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.
|
Latest Threads
LQ News
|
|