- ------------------------------------------------------------------------
Debian Security Advisory DSA-257-1                   security@debian.org 
Debian -- Security Information                          Wichert Akkerman
March  4, 2003
- ------------------------------------------------------------------------


Package        : sendmail
Problem type   : remote exploit
Debian-specific: no

Mark Dowd of ISS X-Force found a bug in the header parsing routines
of sendmail: it could overflow a buffer overflow when encountering
addresses with very long comments. Since sendmail also parses headers 
when forwarding emails this vulnerability can hit mail-servers which do
not deliver the email as well.

This has been fixed in upstream release 8.12.8, version 8.12.3-5 of
the package for Debian GNU/Linux 3.0/woody and version 8.9.3-25 of the
package for Debian GNU/Linux 2.2/potato.

- ------------------------------------------------------------------------

Obtaining updates:

  By hand:
    wget URL
        will fetch the file for you.
    dpkg -i FILENAME.deb
        will install the fetched file.

  With apt:
    deb  Debian -- Security Information  stable/updates main
        added to /etc/apt/sources.list will provide security updates

Additional information can be found on the Debian security webpages
at  Debian -- Security Information 

- ------------------------------------------------------------------------


Debian GNU/Linux 2.2 alias potato
- ---------------------------------

  Potato was released for alpha, arm, i386, m68k, powerpc and sparc. At
  this moment updates for the m68k architecture are not yet available.


  Source archives:

      
      Size/MD5 checksum:   142053 a5172ea9cce863ff7796a0e1573bb361
      
      Size/MD5 checksum:      651 5c9e20403c26133eb3b7cd3fad80a608
      
      Size/MD5 checksum:  1068290 efedacfbce84a71d1cfb0e617b84596e

  alpha architecture (DEC Alpha)

      
      Size/MD5 checksum:   989462 5a76b01999d5691e3dfd841f28e76ab1

  arm architecture (ARM)

      
      Size/MD5 checksum:   947790 c0cf8d1e66be69d3525623d126af7c4d

  i386 architecture (Intel ia32)

      
      Size/MD5 checksum:   931394 b2cd8eb24365b443849ac74bf267a373

  powerpc architecture (PowerPC)

      
      Size/MD5 checksum:   933404 077353947cd8d31bf9cd7b3fdb037b66

  sparc architecture (Sun SPARC/UltraSPARC)

      
      Size/MD5 checksum:   945388 2d08ccae7c9afcfa553df345de92f7d2


Debian GNU/Linux 3.0 alias woody
- --------------------------------

  Woody was released for alpha, arm, hppa, i386, ia64, m68k, mips, mipsel,
  powerpc, s390 and sparc. At this moment updates for the m68k architecture
  are not yet available.


  Source archives:

      
      Size/MD5 checksum:   252348 2176de8c6803953544e45be7cb5b9edf
      
      Size/MD5 checksum:      864 d59c00fa854c4f799a3b80cbc5afb430
      
      Size/MD5 checksum:  1840401 b198b346b10b3b5afc8cb4e12c07ff4d

  Architecture independent packages:

      
      Size/MD5 checksum:   747180 22fd21892f01d09bd0f8dea8b775c9d9

  alpha architecture (DEC Alpha)

      
      Size/MD5 checksum:  1218128 58560487fc226a845fd7296660a61cb5
      
      Size/MD5 checksum:   267188 a76d0c273d9dd6e5e21036687d08a9dc

  hppa architecture (HP PA RISC)

      
      Size/MD5 checksum:   261038 641be1e03d7740867a3411169c679df9
      
      Size/MD5 checksum:  1183136 b28aefc29d9d006d2e41b20cabe3a022

  i386 architecture (Intel ia32)

      
      Size/MD5 checksum:  1003544 add112cbca33ed2ef08c71f4310c3b99
      
      Size/MD5 checksum:   236700 7fad41d249e34da223ef14a5c8d3d0e5

  ia64 architecture (Intel ia64)

      
      Size/MD5 checksum:   281374 f212558f7949f510015a6fb98c5f9eba
      
      Size/MD5 checksum:  1481876 f74b5c848aeac0e0eb4e37457107172b

  mips architecture (MIPS (Big Endian))

      
      Size/MD5 checksum:   254526 d13a130869dbcfa4d987b712d4d5a5b5
      
      Size/MD5 checksum:  1125168 d9ce244ca31591c3856585f3a18fba8f

  mipsel architecture (MIPS (Little Endian))

      
      Size/MD5 checksum:   254218 8ced0f9f7e5fe6fce92b21d151a74262
      
      Size/MD5 checksum:  1126432 46a7e7aeaf692952d33af1e440f1ca24

  powerpc architecture (PowerPC)

      
      Size/MD5 checksum:   256638 1979775c88595b879c51c189cb988bbe
      
      Size/MD5 checksum:  1072842 930eacda0842a5352baaa0777a766c8b

  s390 architecture (IBM S/390)

      
      Size/MD5 checksum:   241982 12308ce83066626a829801eacb84b750
      
      Size/MD5 checksum:  1049162 4d236fb632838c25c889060d513aff38

  sparc architecture (Sun SPARC/UltraSPARC)

      
      Size/MD5 checksum:   244686 18ab3afa614305c57ee90ca88c653a96
      
      Size/MD5 checksum:  1069094 d0d8b236d637c04490fc5355b1a41701

- -- 
- ----------------------------------------------------------------------------
Debian Security team <team@security.debian.org> 
Debian -- Security Information 
Mailing-List: debian-security-announce@lists.debian.org



Debian: sendmail remote exploit

March 4, 2003
A remote vulnerability exists that can result in commands can be executed with administrative privileges.

Summary

Package : sendmail
Problem type : remote exploit
Debian-specific: no

Mark Dowd of ISS X-Force found a bug in the header parsing routines
of sendmail: it could overflow a buffer overflow when encountering
addresses with very long comments. Since sendmail also parses headers
when forwarding emails this vulnerability can hit mail-servers which do
not deliver the email as well.

This has been fixed in upstream release 8.12.8, version 8.12.3-5 of
the package for Debian GNU/Linux 3.0/woody and version 8.9.3-25 of the
package for Debian GNU/Linux 2.2/potato.


Obtaining updates:

By hand:
wget URL
will fetch the file for you.
dpkg -i FILENAME.deb
will install the fetched file.

With apt:
deb Debian -- Security Information stable/updates main
added to /etc/apt/sources.list will provide security updates

Additional information can be found on the Debian security webpages
at Debian -- Security Information



Debian GNU/Linux 2.2 alias potato

Potato was released for alp...

Read the Full Advisory

Severity

Related News