7268558 2001-10-10 09:05 -0600 /96 rader/ Support Info <supinfo@caldera.com>
Sänt av: joel@lysator.liu.se
Importerad: 2001-10-10 18:12 av Brevbäraren
Extern mottagare: announce@lists.caldera.com
Extern mottagare: bugtraq@securityfocus.com
Extern mottagare: linux-security@redhat.com
Extern mottagare: linuxlist@securityportal.com
Mottagare: Bugtraq (import) <19403>
Ärende: Security Update: [CSSA-2001-34.0] Linux: sendmail queue run privilege problem
------------------------------------------------------------
From: Support Info <supinfo@caldera.com>
To: announce@lists.caldera.com, bugtraq@securityfocus.com,
linux-security@redhat.com, linuxlist@securityportal.com
Message-ID: <20011010090548.A5526@phoenix.calderasystems.com>
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
Caldera International, Inc. Security Advisory
Subject: Linux - sendmail queue run privilege problem
Advisory number: CSSA-2001-034.0
Issue date: 2001, October 05
Cross reference:
______________________________________________________________________________
1. Problem Description
There is a permission problem in the default setup of sendmail in
all OpenLinux versions, which allows a local attacker to cause a
denial of service attack effectively stopping delivery of all
mails from the current system.
This vulnerability also allows a local attacker to read the full
headers of all mails in the mail queue.
2. Vulnerable Versions
All sendmail versions on currently supported OpenLinux product are
vulnerable.
3. Solution
There are no fixed packages available.
Workaround:
OpenLinux 2.3, OpenLinux eServer 2.3.1 and OpenLinux eDesktop 2.4:
In /etc/sendmail.cf, change the line:
O PrivacyOptions=authwarnings
to read:
O PrivacyOptions=authwarnings,restrictqrun
OpenLinux Workstation and Server 3.1:
In /etc/mail/sendmail.cf, change the line:
O PrivacyOptions=authwarnings,noexpn,novrfy,noetrn,noverb
to read:
O PrivacyOptions=authwarnings,noexpn,novrfy,noetrn,noverb,restrictqrun
4. References
This and other Caldera security resources are located at:
http://www.caldera.com/support/security/index.html
This security fix closes Caldera's internal Problem Report 10576.
5. Disclaimer
Caldera International, Inc. is not responsible for the misuse of
any of the information we provide on this website and/or through
our security advisories. Our advisories are a service to our
customers intended to promote secure installation and use of
Caldera OpenLinux.
11. Acknowledgements
Caldera International wishes to thank Michal Zalewski for pointing
out this problem.
______________________________________________________________________________
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org
iD8DBQE7vXbB18sy83A/qfwRAogdAKCo3+7TxdXQjpcUlju+AH2nGZP/+QCdFj7m
S3lXcUgF2b2ihvDBYKco6x8=
=zQ4+
-----END PGP SIGNATURE-----
(7268558) /Support Info <supinfo@caldera.com>/(Ombruten)