Yellow Dog Security Advisory: YDU-20030304-1

yellowdog-updates@lists.terrasoftsolutions.com yellowdog-updates@lists.terrasoftsolutions.com
Tue, 4 Mar 2003 14:02:29 -0700 (MST)


Yellow Dog Linux Security Announcement
--------------------------------------

Package:	sendmail
Issue Date:	March 04, 2003
Priority:	high
Advisory ID: 	YDU-20030304-1


1. 	Topic:

	Updated sendmail packages are available.


2. 	Problem:

	"During a code audit of Sendmail by ISS, a critical vulnerability was
	uncovered that affects unpatched versions of Sendmail prior to version
	8.12.8. A remote attacker can send a carefully crafted email message
	which, when processed by sendmail, causes arbitrary code to be
	executed as root.

	We are advised that a proof-of-concept exploit is known to exist, but
	is not believed to be in the wild.

	Since this is a message-based vulnerability, MTAs other than Sendmail
	may pass on the carefully crafted message. This means that unpatched
	versions of Sendmail inside a network could still be at risk even if
	they do not accept external connections directly.

	In addition, the restricted shell (SMRSH) in Sendmail allows attackers to
	bypass the intended restrictions of smrsh by inserting additional commands
	after "||" sequences or "/" characters, which are not properly filtered or
	verified. A sucessful attack would allow an attacker who has a local
	account on a system which has explicitly enabled smrsh to execute arbitrary
	binaries as themselves by utilizing their .forward file.

	All users are advised to update to these erratum packages."
	(from Red Hat Advisory)


3. 	Solution:

   	a) Updating via apt...
   	We suggest that you use the apt-get program to keep your
   	system up-to-date. The following command(s) will retrieve
   	and install the fixed version of this update onto your system:

		apt-get update
		apt-get install sendmail

   	b) Updating manually...
	Download the updates below and then run the following rpm command.
   	(Please use a mirror site)

		rpm -Fvh [filenames]
		ftp://ftp.yellowdoglinux.com/pub/yellowdog/updates/yellowdog-2.3/
			ppc/sendmail-8.11.6-23a.72.ppc.rpm
			ppc/sendmail-cf-8.11.6-23a.72.ppc.rpm
			ppc/sendmail-devel-8.11.6-23a.72.ppc.rpm
			ppc/sendmail-doc-8.11.6-23a.72.ppc.rpm


4. Verification

MD5 checksum			  Package
--------------------------------  ----------------------------
a204c252209d59600bfddb9eeb1b6f18  ppc/sendmail-8.11.6-23a.72.ppc.rpm
916517f67ecbb524aecf89d61ebd24f8  ppc/sendmail-cf-8.11.6-23a.72.ppc.rpm
28fdd43e4d952ebb54d6276654890e83  ppc/sendmail-devel-8.11.6-23a.72.ppc.rpm
2e531410ed6395ffafa1e597ed7bdec0  ppc/sendmail-doc-8.11.6-23a.72.ppc.rpm
6d5fa214631a0fd99da4fb51cfb08a0d  SRPMS/sendmail-8.11.6-23a.72.src.rpm

I wish to verify that each package has not been corrupted or tampered with,
examine the md5sum with the following command: rpm --checksig --nogpg filename


5. Misc.

Terra Soft has setup a moderated mailing list where these security, bugfix, and package
enhancement announcements will be posted. See http://lists.terrasoftsolutions.com/ for more
information.

For information regarding the usage of apt-get, see:
http://www.yellowdoglinux.com/support/solutions/ydl_general/apt-get.shtml