Bugtraq mailing list archives
GLSA: sendmail
From: Daniel Ahlberg <aliz () gentoo org>
Date: Sun, 13 Oct 2002 16:48:21 +0200
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - -------------------------------------------------------------------- GENTOO LINUX SECURITY ANNOUNCEMENT - - -------------------------------------------------------------------- PACKAGE :sendmail SUMMARY :smsrh bypass vulnerabilites DATE :2002-10-13 14:45 UTC - - -------------------------------------------------------------------- It is possible for an attacker to bypass the restrictions imposed by The Sendmail Consortiums Restricted Shell (SMRSH) and execute a binary of his choosing by inserting a special character sequence into his .forward file. Read the full advisory at http://www.sendmail.org/smrsh.adv.txt SOLUTION It is recommended that all Gentoo Linux users who are running net-mail/sendmail-8.12.6 and earlier update their systems as follows: emerge rsync emerge sendmail emerge clean - - -------------------------------------------------------------------- aliz () gentoo org - GnuPG key is available at www.gentoo.org/~aliz - - -------------------------------------------------------------------- -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.7 (GNU/Linux) iD8DBQE9qYe0fT7nyhUpoZMRAikZAJ401MoPiOSGimzqUq25IPj7sNIrIwCghsXn pXPevOcEyJm89c2k67OIA9g= =8Hz5 -----END PGP SIGNATURE-----
Current thread:
- GLSA: sendmail Daniel Ahlberg (Oct 14)