[29555] in bugtraq
Re: sendmail 8.12.9 available
daemon@ATHENA.MIT.EDU (Dan Harkless)
Sat Mar 29 17:13:40 2003
Message-Id: <200303292055.h2TKtsZo009967@www.harkless.org>
From: Dan Harkless <bugtraq@harkless.org>
To: bugtraq@securityfocus.com
In-Reply-To: Message from Claus Assmann <ca+announce@sendmail.org>
of "Sat, 29 Mar 2003 11:19:48 PST." <20030329111948.C17695@zardoc.esmtp.org>
Date: Sat, 29 Mar 2003 12:55:54 -0800
Claus Assmann <ca+announce@sendmail.org> writes:
> We apologize for releasing this information today (2003-03-29) but
> we were forced to do so by an e-mail on a public mailing list (that
> has been sent by an irresponsible individual) which contains
> information about the security flaw.
[...]
> SECURITY: Fix a buffer overflow in address parsing due to
> a char to int conversion problem which is potentially
> remotely exploitable. Problem found by Michal Zalewski.
> Note: an MTA that is not patched might be vulnerable to
> data that it receives from untrusted sources, which
> includes DNS.
Since this was publically disclosed before a patch was available, I'm sure a
lot of people would be interested in knowing whether attempts to exploit
this are detectable in the syslog in sendmail's default configuration.
--
Dan Harkless
bugtraq@harkless.org
http://harkless.org/dan/