Home > Security > Advisories

Advisories

Mandriva Advisories

Package name sendmail
Date June 14th, 2006
Advisory ID MDKSA-2006:104
Affected versions CS3.0, MNF2.0, 10.2, 2006.0
Synopsis Updated sendmail packages fix remotely exploitable vulnerability

Problem Description

A vulnerability in the way Sendmail handles multi-part MIME messages
was discovered that could allow a remote attacker to create a carefully
crafted message that could crash the sendmail process during delivery.

The updated packages have been patched to correct these issues.

Updated Packages

Corporate Server 3.0

 1f7889191631f8b4e97c16bb66c45c81  corporate/3.0/RPMS/sendmail-8.12.11-1.2.C30mdk.i586.rpm
 6dec993c7882267252f14e42ecd16f5b  corporate/3.0/RPMS/sendmail-cf-8.12.11-1.2.C30mdk.i586.rpm
 5cdd264853141757f8e966a9be70d462  corporate/3.0/RPMS/sendmail-devel-8.12.11-1.2.C30mdk.i586.rpm
 9889d673b7e87f2f86cfa9e73b8103f6  corporate/3.0/RPMS/sendmail-doc-8.12.11-1.2.C30mdk.i586.rpm
 988ac5bc0330e8beec3c7bf52c374c3d  corporate/3.0/SRPMS/sendmail-8.12.11-1.2.C30mdk.src.rpm

Corporate Server 3.0/X86_64

 a3b73368a0e013a33b33c65c5e98e8cc  x86_64/corporate/3.0/RPMS/sendmail-8.12.11-1.2.C30mdk.x86_64.rpm
 a0ea18d115e8efb2a89b43a6cb7c4f5f  x86_64/corporate/3.0/RPMS/sendmail-cf-8.12.11-1.2.C30mdk.x86_64.rpm
 1e9b04f41611fb78d2059d82725ab7f7  x86_64/corporate/3.0/RPMS/sendmail-devel-8.12.11-1.2.C30mdk.x86_64.rpm
 10e29b80349114a764bfb1fcfcbe5e30  x86_64/corporate/3.0/RPMS/sendmail-doc-8.12.11-1.2.C30mdk.x86_64.rpm
 988ac5bc0330e8beec3c7bf52c374c3d  x86_64/corporate/3.0/SRPMS/sendmail-8.12.11-1.2.C30mdk.src.rpm

Multi Network Firewall 2.0

 d8b9a398e99a2b7cd6390cbf19161987  mnf/2.0/RPMS/sendmail-8.12.11-1.2.M20mdk.i586.rpm
 17a75e7f8a3d6d6cb56329e9b6c7bb57  mnf/2.0/RPMS/sendmail-cf-8.12.11-1.2.M20mdk.i586.rpm
 3dba7187822ab418050dd8a7061b873d  mnf/2.0/SRPMS/sendmail-8.12.11-1.2.M20mdk.src.rpm

Mandriva Linux LE2005

 ae38971f32c425559e48b1cffc54c1de  10.2/RPMS/sendmail-8.13.3-2.2.102mdk.i586.rpm
 a5d541e7bcf183565413cbd58f621324  10.2/RPMS/sendmail-cf-8.13.3-2.2.102mdk.i586.rpm
 0dbf1c048543e8fc4be2f57bf98d27b3  10.2/RPMS/sendmail-devel-8.13.3-2.2.102mdk.i586.rpm
 4d54ff93663180cbe0459d0f4bc2dc77  10.2/RPMS/sendmail-doc-8.13.3-2.2.102mdk.i586.rpm
 426cf631d8ef58a87e271a505e448141  10.2/SRPMS/sendmail-8.13.3-2.2.102mdk.src.rpm

Mandriva Linux LE2005/X86_64

 3703cca877a631438ab6c764bdbacdcf  x86_64/10.2/RPMS/sendmail-8.13.3-2.2.102mdk.x86_64.rpm
 42c7ec64d37d3b01c51c92293ac3b75d  x86_64/10.2/RPMS/sendmail-cf-8.13.3-2.2.102mdk.x86_64.rpm
 3793e9fc7fe6f276622f8201f058880c  x86_64/10.2/RPMS/sendmail-devel-8.13.3-2.2.102mdk.x86_64.rpm
 1ee6790bc995552f9a2edc0f5a7c82cb  x86_64/10.2/RPMS/sendmail-doc-8.13.3-2.2.102mdk.x86_64.rpm
 426cf631d8ef58a87e271a505e448141  x86_64/10.2/SRPMS/sendmail-8.13.3-2.2.102mdk.src.rpm

Mandriva Linux 2006

 6e0692d3da4855c709cd6887e250307c  2006.0/RPMS/sendmail-8.13.4-6.2.20060mdk.i586.rpm
 e3ba6f0cdc1889cbd3341752ab692feb  2006.0/RPMS/sendmail-cf-8.13.4-6.2.20060mdk.i586.rpm
 7550c2fc61fc8055ca70c8dcfed83b24  2006.0/RPMS/sendmail-devel-8.13.4-6.2.20060mdk.i586.rpm
 37d4daa577cbb2376d4668daf7a93ac1  2006.0/RPMS/sendmail-doc-8.13.4-6.2.20060mdk.i586.rpm
 cd7d68cbd7468e3f2ca518a4cbb6a512  2006.0/SRPMS/sendmail-8.13.4-6.2.20060mdk.src.rpm

Mandriva Linux 2006/X86_64

 6cc73e9962e0db4deb3293aede92461e  x86_64/2006.0/RPMS/sendmail-8.13.4-6.2.20060mdk.x86_64.rpm
 ef6cefe40f874bf47d245a5d0ee9a693  x86_64/2006.0/RPMS/sendmail-cf-8.13.4-6.2.20060mdk.x86_64.rpm
 8bc955699f5e530346887c5445b91c47  x86_64/2006.0/RPMS/sendmail-devel-8.13.4-6.2.20060mdk.x86_64.rpm
 679e95e7801fffe86bb6e7cf8d7e6263  x86_64/2006.0/RPMS/sendmail-doc-8.13.4-6.2.20060mdk.x86_64.rpm
 cd7d68cbd7468e3f2ca518a4cbb6a512  x86_64/2006.0/SRPMS/sendmail-8.13.4-6.2.20060mdk.src.rpm

References

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1173
http://www.kb.cert.org/vuls/id/146718

Upgrade

To upgrade automatically, use MandrivaUpdate.


Verification

Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :

                rpm --checksig package.rpm
                

You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.

If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.