Debian DSA-290-1 : sendmail-wide - char-to-int conversion

critical Nessus Plugin ID 15127

Synopsis

The remote Debian host is missing a security-related update.

Description

Michal Zalewski discovered a buffer overflow, triggered by a char to int conversion, in the address parsing code in sendmail, a widely used powerful, efficient, and scalable mail transport agent. This problem is potentially remotely exploitable.

Solution

Upgrade the sendmail-wide packages.

For the stable distribution (woody) this problem has been fixed in version 8.12.3+3.5Wbeta-5.4

For the old stable distribution (potato) this problem has been fixed in version 8.9.3+3.2W-25

See Also

http://www.debian.org/security/2003/dsa-290

Plugin Details

Severity: Critical

ID: 15127

File Name: debian_DSA-290.nasl

Version: 1.26

Type: local

Agent: unix

Published: 9/29/2004

Updated: 1/4/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/o:debian:debian_linux:3.0, p-cpe:/a:debian:debian_linux:sendmail-wide, cpe:/o:debian:debian_linux:2.2

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/17/2003

Vulnerability Publication Date: 3/29/2003

Reference Information

CVE: CVE-2003-0161

BID: 7230

CERT: 897604

DSA: 290