sendmail - Remote Buffer Overflow
Package(s): | sendmail | CVE #(s): | CAN-2002-1337 | ||||||||||||||||||||||||||||||||||||||||||||
Created: | March 3, 2003 | Updated: | March 10, 2003 | ||||||||||||||||||||||||||||||||||||||||||||
Description: | ISS has turned
up an unpleasant problem with sendmail; by sending a properly crafted
message, an attacker can run arbitrary code as root on a target
system. This is the sort of hole that can lead to all sorts of problems,
including widespread breakins and Internet worms. Everybody who is running
sendmail should upgrade to version 8.12.8 at the first
opportunity. Note that systems behind firewalls need to be fixed too.
See CERT Advisory CA-2003-07 for additional information. | ||||||||||||||||||||||||||||||||||||||||||||||
Alerts: |
|
Posted Mar 4, 2003 14:19 UTC (Tue)
by angdraug (subscriber, #7487)
[Link]
Posted Mar 6, 2003 3:19 UTC (Thu)
by barrygould (guest, #4774)
[Link]
Does this mean that the security page keeps itself up to date? Thanks,
Advisory for Debian is already out there, too.
Sendmail - Remote Buffer Overflow
Interesting, I'm reading LWN from almost two weeks ago (2/20), yet this sendmail advisory from this week appears on it.sendmail - Remote Buffer Overflow
Barry