Login
Newsletter
Werbung

Sicherheit: Denial of Service in sendmail
Aktuelle Meldungen Distributionen
Name: Denial of Service in sendmail
ID: MDKSA-2006:156
Distribution: Mandriva
Plattformen: Mandriva Corporate 3.0, Mandriva Multi Network Firewall 2.0, Mandriva 2006.0
Datum: Do, 31. August 2006, 02:26
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4434
Applikationen: Sendmail

Originalnachricht

This is a multi-part message in MIME format...

------------=_1156983980-23892-342


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2006:156
http://www.mandriva.com/security/
_______________________________________________________________________

Package : sendmail
Date : August 30, 2006
Affected: 2006.0, Corporate 3.0, Multi Network Firewall 2.0
_______________________________________________________________________

Problem Description:

Moritz Jodeit discovered a vulnerability in sendmail when processing
very long header lines that could be exploited to cause a Denial of
Service by crashing sendmail.

The updated packages have been patched to correct this issue.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4434
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2006.0:
a870f27eea807314c3688258eed755a5
2006.0/RPMS/sendmail-8.13.4-6.3.20060mdk.i586.rpm
35666ba77272168154638784d3126e8a
2006.0/RPMS/sendmail-cf-8.13.4-6.3.20060mdk.i586.rpm
e68900de30eb26c1ad6023b6f25feda4
2006.0/RPMS/sendmail-devel-8.13.4-6.3.20060mdk.i586.rpm
adbdad6844cc56e002e300703dfa800f
2006.0/RPMS/sendmail-doc-8.13.4-6.3.20060mdk.i586.rpm
8db59bc684bf7ee7b50f8d9025aa2f99
2006.0/SRPMS/sendmail-8.13.4-6.3.20060mdk.src.rpm

Mandriva Linux 2006.0/X86_64:
1c23ae6dc8b9aad58efa1f45082bd594
x86_64/2006.0/RPMS/sendmail-8.13.4-6.3.20060mdk.x86_64.rpm
4a4d76c56fb75c24994b0e7759033462
x86_64/2006.0/RPMS/sendmail-cf-8.13.4-6.3.20060mdk.x86_64.rpm
15316c4ecd26d10f840a0e2e9cff0164
x86_64/2006.0/RPMS/sendmail-devel-8.13.4-6.3.20060mdk.x86_64.rpm
31db86ce194192d535a6adbb60f86691
x86_64/2006.0/RPMS/sendmail-doc-8.13.4-6.3.20060mdk.x86_64.rpm
8db59bc684bf7ee7b50f8d9025aa2f99
x86_64/2006.0/SRPMS/sendmail-8.13.4-6.3.20060mdk.src.rpm

Corporate 3.0:
421f3b45e01bbb9ea6dd907a60eafd21
corporate/3.0/RPMS/sendmail-8.12.11-1.3.C30mdk.i586.rpm
363fe7e5f501e3c638f893e3bb805889
corporate/3.0/RPMS/sendmail-cf-8.12.11-1.3.C30mdk.i586.rpm
efdfae3157d77708d2fdec4fdcbd2362
corporate/3.0/RPMS/sendmail-devel-8.12.11-1.3.C30mdk.i586.rpm
05d8e255ebe10729361bde038ab999ec
corporate/3.0/RPMS/sendmail-doc-8.12.11-1.3.C30mdk.i586.rpm
bc7577c81a324fb8c2cb4392f9039372
corporate/3.0/SRPMS/sendmail-8.12.11-1.3.C30mdk.src.rpm

Corporate 3.0/X86_64:
65d846ef86d0df8d32316c79a2b9a326
x86_64/corporate/3.0/RPMS/sendmail-8.12.11-1.3.C30mdk.x86_64.rpm
457e8e7d69b48bbeff20a54c3f01ef4d
x86_64/corporate/3.0/RPMS/sendmail-cf-8.12.11-1.3.C30mdk.x86_64.rpm
34e7e51ef099d09b4781d79b3e05be42
x86_64/corporate/3.0/RPMS/sendmail-devel-8.12.11-1.3.C30mdk.x86_64.rpm
31d545ea1139af2b397a5e65d1b6c961
x86_64/corporate/3.0/RPMS/sendmail-doc-8.12.11-1.3.C30mdk.x86_64.rpm
bc7577c81a324fb8c2cb4392f9039372
x86_64/corporate/3.0/SRPMS/sendmail-8.12.11-1.3.C30mdk.src.rpm

Multi Network Firewall 2.0:
d4f9409b6f07b43d8d28340553a42aac
mnf/2.0/RPMS/sendmail-8.12.11-1.3.M20mdk.i586.rpm
f50c4ea50ac1f24431c7a693cc665e72
mnf/2.0/RPMS/sendmail-cf-8.12.11-1.3.M20mdk.i586.rpm
7b141d0baf6d3c42bc88bf9aec6c3c93
mnf/2.0/SRPMS/sendmail-8.12.11-1.3.M20mdk.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFE9egqmqjQ0CJFipgRApk0AJ96l62HBwBLqNdXdTv3XlKZW9qYhACfaRui
AA2jidzJyYzItJ2RZHIMtHQ=
=jHtc
-----END PGP SIGNATURE-----


------------=_1156983980-23892-342
Content-Type: text/plain; name="message-footer.txt"
Content-Disposition: inline; filename="message-footer.txt"
Content-Transfer-Encoding: 8bit

To unsubscribe, send a email to sympa@mandrivalinux.org
with this subject : unsubscribe security-announce
_______________________________________________________
Want to buy your Pack or Services from Mandriva?
Go to http://www.mandrivastore.com
Join the Club : http://www.mandrivaclub.com
_______________________________________________________

------------=_1156983980-23892-342--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung