[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[debian-users:36412] Forward: [SECURITY] [DSA-257-1] sendmail remote exploit



ã“ã®DSAã¯potatoã«ã‚‚é©ç”¨ã•ã‚Œã¾ã™ã€‚

ç¾åœ¨ã® Debian 安定版 (3.0 woody) ã«ã‚»ã‚­ãƒ¥ãƒªãƒ†ã‚£ã«é–¢ã™ã‚‹æ·±åˆ»ãªå•é¡ŒãŒç™ºè¦‹
ã•ã‚Œã¾ã—ãŸã€‚

対象パッケージ: sendmail

対処済ã¿ã®ãƒ‘ッケージã«æ›´æ–°ã™ã‚‹ã«ã¯ã€

deb http://security.debian.org/ stable/updates main contrib non-free

ã‚’ /etc/apt/sources.list ã«è¿½åŠ ã—ã€

apt-get update ; apt-get upgrade

を実行ã—ã¦ãã ã•ã„。

詳細ã«ã¤ã„ã¦ã¯æ·»ä»˜ã®ã‚¢ãƒŠã‚¦ãƒ³ã‚¹ã‚’ã”覧ãã ã•ã„。

--- Begin Message ---
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
Debian Security Advisory DSA-257-1                   security@debian.org
http://www.debian.org/security/                         Wichert Akkerman
March  4, 2003
- ------------------------------------------------------------------------


Package        : sendmail
Problem type   : remote exploit
Debian-specific: no

Mark Dowd of ISS X-Force found a bug in the header parsing routines
of sendmail: it could overflow a buffer overflow when encountering
addresses with very long comments. Since sendmail also parses headers 
when forwarding emails this vulnerability can hit mail-servers which do
not deliver the email as well.

This has been fixed in upstream release 8.12.8, version 8.12.3-5 of
the package for Debian GNU/Linux 3.0/woody and version 8.9.3-25 of the
package for Debian GNU/Linux 2.2/potato.

- ------------------------------------------------------------------------

Obtaining updates:

  By hand:
    wget URL
        will fetch the file for you.
    dpkg -i FILENAME.deb
        will install the fetched file.

  With apt:
    deb http://security.debian.org/ stable/updates main
        added to /etc/apt/sources.list will provide security updates

Additional information can be found on the Debian security webpages
at http://www.debian.org/security/

- ------------------------------------------------------------------------


Debian GNU/Linux 2.2 alias potato
- ---------------------------------

  Potato was released for alpha, arm, i386, m68k, powerpc and sparc. At
  this moment updates for the m68k architecture are not yet available.


  Source archives:

    http://security.debian.org/pool/updates/main/s/sendmail/sendmail_8.9.3-25.diff.gz
      Size/MD5 checksum:   142053 a5172ea9cce863ff7796a0e1573bb361
    http://security.debian.org/pool/updates/main/s/sendmail/sendmail_8.9.3-25.dsc
      Size/MD5 checksum:      651 5c9e20403c26133eb3b7cd3fad80a608
    http://security.debian.org/pool/updates/main/s/sendmail/sendmail_8.9.3.orig.tar.gz
      Size/MD5 checksum:  1068290 efedacfbce84a71d1cfb0e617b84596e

  alpha architecture (DEC Alpha)

    http://security.debian.org/pool/updates/main/s/sendmail/sendmail_8.9.3-25_alpha.deb
      Size/MD5 checksum:   989462 5a76b01999d5691e3dfd841f28e76ab1

  arm architecture (ARM)

    http://security.debian.org/pool/updates/main/s/sendmail/sendmail_8.9.3-25_arm.deb
      Size/MD5 checksum:   947790 c0cf8d1e66be69d3525623d126af7c4d

  i386 architecture (Intel ia32)

    http://security.debian.org/pool/updates/main/s/sendmail/sendmail_8.9.3-25_i386.deb
      Size/MD5 checksum:   931394 b2cd8eb24365b443849ac74bf267a373

  powerpc architecture (PowerPC)

    http://security.debian.org/pool/updates/main/s/sendmail/sendmail_8.9.3-25_powerpc.deb
      Size/MD5 checksum:   933404 077353947cd8d31bf9cd7b3fdb037b66

  sparc architecture (Sun SPARC/UltraSPARC)

    http://security.debian.org/pool/updates/main/s/sendmail/sendmail_8.9.3-25_sparc.deb
      Size/MD5 checksum:   945388 2d08ccae7c9afcfa553df345de92f7d2


Debian GNU/Linux 3.0 alias woody
- --------------------------------

  Woody was released for alpha, arm, hppa, i386, ia64, m68k, mips, mipsel,
  powerpc, s390 and sparc. At this moment updates for the m68k architecture
  are not yet available.


  Source archives:

    http://security.debian.org/pool/updates/main/s/sendmail/sendmail_8.12.3-5.diff.gz
      Size/MD5 checksum:   252348 2176de8c6803953544e45be7cb5b9edf
    http://security.debian.org/pool/updates/main/s/sendmail/sendmail_8.12.3-5.dsc
      Size/MD5 checksum:      864 d59c00fa854c4f799a3b80cbc5afb430
    http://security.debian.org/pool/updates/main/s/sendmail/sendmail_8.12.3.orig.tar.gz
      Size/MD5 checksum:  1840401 b198b346b10b3b5afc8cb4e12c07ff4d

  Architecture independent packages:

    http://security.debian.org/pool/updates/main/s/sendmail/sendmail-doc_8.12.3-5_all.deb
      Size/MD5 checksum:   747180 22fd21892f01d09bd0f8dea8b775c9d9

  alpha architecture (DEC Alpha)

    http://security.debian.org/pool/updates/main/s/sendmail/sendmail_8.12.3-5_alpha.deb
      Size/MD5 checksum:  1218128 58560487fc226a845fd7296660a61cb5
    http://security.debian.org/pool/updates/main/s/sendmail/libmilter-dev_8.12.3-5_alpha.deb
      Size/MD5 checksum:   267188 a76d0c273d9dd6e5e21036687d08a9dc

  hppa architecture (HP PA RISC)

    http://security.debian.org/pool/updates/main/s/sendmail/libmilter-dev_8.12.3-5_hppa.deb
      Size/MD5 checksum:   261038 641be1e03d7740867a3411169c679df9
    http://security.debian.org/pool/updates/main/s/sendmail/sendmail_8.12.3-5_hppa.deb
      Size/MD5 checksum:  1183136 b28aefc29d9d006d2e41b20cabe3a022

  i386 architecture (Intel ia32)

    http://security.debian.org/pool/updates/main/s/sendmail/sendmail_8.12.3-5_i386.deb
      Size/MD5 checksum:  1003544 add112cbca33ed2ef08c71f4310c3b99
    http://security.debian.org/pool/updates/main/s/sendmail/libmilter-dev_8.12.3-5_i386.deb
      Size/MD5 checksum:   236700 7fad41d249e34da223ef14a5c8d3d0e5

  ia64 architecture (Intel ia64)

    http://security.debian.org/pool/updates/main/s/sendmail/libmilter-dev_8.12.3-5_ia64.deb
      Size/MD5 checksum:   281374 f212558f7949f510015a6fb98c5f9eba
    http://security.debian.org/pool/updates/main/s/sendmail/sendmail_8.12.3-5_ia64.deb
      Size/MD5 checksum:  1481876 f74b5c848aeac0e0eb4e37457107172b

  mips architecture (MIPS (Big Endian))

    http://security.debian.org/pool/updates/main/s/sendmail/libmilter-dev_8.12.3-5_mips.deb
      Size/MD5 checksum:   254526 d13a130869dbcfa4d987b712d4d5a5b5
    http://security.debian.org/pool/updates/main/s/sendmail/sendmail_8.12.3-5_mips.deb
      Size/MD5 checksum:  1125168 d9ce244ca31591c3856585f3a18fba8f

  mipsel architecture (MIPS (Little Endian))

    http://security.debian.org/pool/updates/main/s/sendmail/libmilter-dev_8.12.3-5_mipsel.deb
      Size/MD5 checksum:   254218 8ced0f9f7e5fe6fce92b21d151a74262
    http://security.debian.org/pool/updates/main/s/sendmail/sendmail_8.12.3-5_mipsel.deb
      Size/MD5 checksum:  1126432 46a7e7aeaf692952d33af1e440f1ca24

  powerpc architecture (PowerPC)

    http://security.debian.org/pool/updates/main/s/sendmail/libmilter-dev_8.12.3-5_powerpc.deb
      Size/MD5 checksum:   256638 1979775c88595b879c51c189cb988bbe
    http://security.debian.org/pool/updates/main/s/sendmail/sendmail_8.12.3-5_powerpc.deb
      Size/MD5 checksum:  1072842 930eacda0842a5352baaa0777a766c8b

  s390 architecture (IBM S/390)

    http://security.debian.org/pool/updates/main/s/sendmail/libmilter-dev_8.12.3-5_s390.deb
      Size/MD5 checksum:   241982 12308ce83066626a829801eacb84b750
    http://security.debian.org/pool/updates/main/s/sendmail/sendmail_8.12.3-5_s390.deb
      Size/MD5 checksum:  1049162 4d236fb632838c25c889060d513aff38

  sparc architecture (Sun SPARC/UltraSPARC)

    http://security.debian.org/pool/updates/main/s/sendmail/libmilter-dev_8.12.3-5_sparc.deb
      Size/MD5 checksum:   244686 18ab3afa614305c57ee90ca88c653a96
    http://security.debian.org/pool/updates/main/s/sendmail/sendmail_8.12.3-5_sparc.deb
      Size/MD5 checksum:  1069094 d0d8b236d637c04490fc5355b1a41701

- -- 
- ----------------------------------------------------------------------------
Debian Security team <team@security.debian.org>
http://www.debian.org/security/
Mailing-List: debian-security-announce@lists.debian.org

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQE+ZJP4PLiSUC+jvC0RAk7+AKCom8/H3PSrDVPl7RAkNxdrqTadVwCfTl1N
Pzo10wZHlv6HJx8AIao3Gl4=
=WD/P
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to debian-security-announce-request@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org

--- End Message ---