-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Friday 05 October 2001 05:36 pm, Chris Kloiber wrote:
> On Fri, 5 Oct 2001, Margaret Doll wrote:
> > Dear group,
> >
> >     Recently I received notification that sendmail should be
> > upgraded to 8.12.1 and ssh to 2.9.9 because of known vulnerabilities.
> > When will these packages be available for RH 7.1?
> >
> >     Thanks.
>
> We recently released a security errata for sendmail-8.11.6-1.7.1 that I
> believe fixes the problems there. There may be an openssh errata in the
> works, but I am not aware of it at this time.

There was a new sendmail advisory posted to bugtraq for sendmail versions 
up to and including 8.12.0. From the looks of it, sendmail has resolved 
them in 8.12.1. 

- From that post:
(available here: watch the wrap) 
http://securityfocus.com/cgi-bin/archive.pl?id=1&mid=217549&;
start=2001-09-25&end=2001-10-01

 The mail system privileges compromise affects Sendmail 8.12.0. Other
   problems affect all versions up to 8.12.0.

Vulnerability 1: Mail System Compromise -- CAN-2001-0713
- --------------------------------------------------------

Sendmail 8.12.0, in its default installation, is no longer using a setuid 
root binary to manipulate the mail queue and submit mail. This security
enhancement is supposed to minimize the eventual impact of local Sendmail
vulnerabilities. The new Sendmail binary is setgid smmsp, where smmsp is a
special group with read-write queue access permissions.

- From previous versions, Sendmail 8.12 inherits a functionality that allows
users to specify custom configuration files or configuration parameters. 
In
this case of processing of untrusted configurations, Sendmail was supposed
to drop all extra privileges and continue to run at user level, causing no
security risk. This mechanism worked fine in Sendmail versions prior to
8.12.0. Because of a programming error, this inherited code fails to drop
extra group privileges completely in new setgid conditions, leaving the
saved gid value untouched. By calling the setregid() function, the 
attacker will be able to regain dropped privileges. Extra privileges 
expose a security risk to the mail subsystem and, in specific conditions, 
might lead to further privilege elevation (see discussion below).
<snip>

Vulnerability 2: Queue Manipulation and Destruction -- CAN-2001-0714
- --------------------------------------------------------------------

All versions of Sendmail allow any user to process the whole mail queue,
unless this feature is administratively disabled. This feature itself is 
not dangerous. Due to a programming bug, specific attacker-specified mail
delivery options will be honored. It is possible to, for example, force 
Sendmail to drop queue contents by setting initial message hop count 
above the limit:
<snip>

Vulnerability 3: Debug Mode Leaks Information -- CAN-2001-0715
- --------------------------------------------------------------

This is a fairly low-risk vulnerability related to user-driven queue
processing abilities. Debugging flags can be used to obtain the complete 
mail system configuration, gather potentially interesting information 
about the mail queue (full message path, subject, mail software, etc.) 
even if local users (and the attacker) are not allowed to read the 
configuration or mail queue directly. This can be achieved by issuing the 
following command:
<snip>

- -D

- -- 

pgp key:  http://www.tuxfan.homeip.net:8080/pgpkey.txt

- --
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE7vl12eMAUbzJhSVcRAhncAJ0RjLElli48c1cWRb0fXmYpLlZ8gQCfQCSU
QahmNK1JKDlrqSYx0M7orSU=
=I5SK
-----END PGP SIGNATURE-----



_______________________________________________
Seawolf-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/seawolf-list

Reply via email to