Alerta de Segurança Debian

DSA-290-1 sendmail-wide -- conversão char-para-int

Data do Alerta:
17 Abr 2003
Pacotes Afetados:
sendmail-wide
Vulnerável:
Sim
Referência à base de dados de segurança:
Na base de dados do BugTraq (na SecurityFocus): ID BugTraq 7230.
No dicionário CVE do Mitre: CVE-2003-0161.
Alertas, notas de incidentes e vulnerabilidades do CERT: VU#897604, CA-2003-12.
Informações adicionais:

Michal Zalewski descobriu um buffer overflow, iniciado por uma conversão de caracteres para inteiros, no código de tratamento de endereços do sendmail, um agente de transporte de e-mails poderoso, eficiente e escalável, mundialmente utilizado. Este problema pode ser potencialmente explorado.

Na atual distribuição estável (woody), este problema foi corrigido na versão 8.12.3+3.5Wbeta-5.4

Na antiga distribuição estável (potato), este problema foi corrigido na versão 8.9.3+3.2W-25

Na distribuição instável (sid), este problema foi corrigido na versão 8.12.9+3.5Wbeta-1

Nós recomendamos que você atualize seus pacotes sendmail-wide.

Corrigido em:

Debian GNU/Linux 2.2 (potato)

Fonte:
http://security.debian.org/pool/updates/main/s/sendmail-wide/sendmail-wide_8.9.3+3.2W-25.dsc
http://security.debian.org/pool/updates/main/s/sendmail-wide/sendmail-wide_8.9.3+3.2W-25.tar.gz
Alpha:
http://security.debian.org/pool/updates/main/s/sendmail-wide/sendmail-wide_8.9.3+3.2W-25_alpha.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/s/sendmail-wide/sendmail-wide_8.9.3+3.2W-25_i386.deb
Motorola 680x0:
http://security.debian.org/pool/updates/main/s/sendmail-wide/sendmail-wide_8.9.3+3.2W-25_m68k.deb
PowerPC:
http://security.debian.org/pool/updates/main/s/sendmail-wide/sendmail-wide_8.9.3+3.2W-25_powerpc.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/s/sendmail-wide/sendmail-wide_8.9.3+3.2W-25_sparc.deb

Debian GNU/Linux 3.0 (woody)

Fonte:
http://security.debian.org/pool/updates/main/s/sendmail-wide/sendmail-wide_8.12.3+3.5Wbeta-5.4.dsc
http://security.debian.org/pool/updates/main/s/sendmail-wide/sendmail-wide_8.12.3+3.5Wbeta-5.4.diff.gz
http://security.debian.org/pool/updates/main/s/sendmail-wide/sendmail-wide_8.12.3+3.5Wbeta.orig.tar.gz
Alpha:
http://security.debian.org/pool/updates/main/s/sendmail-wide/sendmail-wide_8.12.3+3.5Wbeta-5.4_alpha.deb
ARM:
http://security.debian.org/pool/updates/main/s/sendmail-wide/sendmail-wide_8.12.3+3.5Wbeta-5.4_arm.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/s/sendmail-wide/sendmail-wide_8.12.3+3.5Wbeta-5.4_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/s/sendmail-wide/sendmail-wide_8.12.3+3.5Wbeta-5.4_ia64.deb
HPPA:
http://security.debian.org/pool/updates/main/s/sendmail-wide/sendmail-wide_8.12.3+3.5Wbeta-5.4_hppa.deb
Motorola 680x0:
http://security.debian.org/pool/updates/main/s/sendmail-wide/sendmail-wide_8.12.3+3.5Wbeta-5.4_m68k.deb
Big endian MIPS:
http://security.debian.org/pool/updates/main/s/sendmail-wide/sendmail-wide_8.12.3+3.5Wbeta-5.4_mips.deb
Little endian MIPS:
http://security.debian.org/pool/updates/main/s/sendmail-wide/sendmail-wide_8.12.3+3.5Wbeta-5.4_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/s/sendmail-wide/sendmail-wide_8.12.3+3.5Wbeta-5.4_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/s/sendmail-wide/sendmail-wide_8.12.3+3.5Wbeta-5.4_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/s/sendmail-wide/sendmail-wide_8.12.3+3.5Wbeta-5.4_sparc.deb

Checksums MD5 dos arquivos listados estão disponíveis no alerta original.