The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


Security Update: [CSSA-2001-34.0] Linux: sendmail queue run privilege problem


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: Wed, 10 Oct 2001 09:05:48 -0600
From: Support Info <[email protected]>
To: [email protected], [email protected],
Subject: Security Update: [CSSA-2001-34.0] Linux: sendmail queue run privilege problem

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

______________________________________________________________________________
		   Caldera International, Inc.  Security Advisory

Subject:		Linux - sendmail queue run privilege problem
Advisory number: 	CSSA-2001-034.0
Issue date: 		2001, October 05
Cross reference:
______________________________________________________________________________


1. Problem Description

   There is a permission problem in the default setup of sendmail in all
   OpenLinux versions, which allows a local attacker to cause a denial
   of service attack effectively stopping delivery of all mails from
   the current system.

   This vulnerability also allows a local attacker to read the full headers
   of all mails in the mail queue.


2. Vulnerable Versions

   All sendmail versions on currently supported OpenLinux product are
   vulnerable.


3. Solution

   There are no fixed packages available.

   Workaround:

    OpenLinux 2.3, OpenLinux eServer 2.3.1 and OpenLinux eDesktop 2.4:

	In /etc/sendmail.cf, change the line:

	  O PrivacyOptions=authwarnings

	to read:

	  O PrivacyOptions=authwarnings,restrictqrun


    OpenLinux Workstation and Server 3.1:

	In /etc/mail/sendmail.cf, change the line:

	  O PrivacyOptions=authwarnings,noexpn,novrfy,noetrn,noverb

	to read:

	  O PrivacyOptions=authwarnings,noexpn,novrfy,noetrn,noverb,restrictqrun


4. References

   This and other Caldera security resources are located at:

   http://www.caldera.com/support/security/index.html

   This security fix closes Caldera's internal Problem Report 10576.


5. Disclaimer

   Caldera International, Inc. is not responsible for the misuse of
   any of the information we provide on this website and/or through our
   security advisories. Our advisories are a service to our customers
   intended to promote secure installation and use of Caldera OpenLinux.


11. Acknowledgements

   Caldera International wishes to thank Michal Zalewski for pointing out
   this problem.

______________________________________________________________________________
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE7vXbB18sy83A/qfwRAogdAKCo3+7TxdXQjpcUlju+AH2nGZP/+QCdFj7m
S3lXcUgF2b2ihvDBYKco6x8=
=zQ4+
-----END PGP SIGNATURE-----

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру