6971022 2001-08-24 17:25 -0700  /78 rader/ Immunix Security Team <security@wirex.com>
Sänt av: joel@lysator.liu.se
Importerad: 2001-08-25  03:08  av Brevbäraren
Extern mottagare: security-alerts@linuxsecurity.com
Extern mottagare: bugtraq@securityfocus.com
Extern mottagare: linux-security@lists.securityportal.com
Extern mottagare: immunix-announce@immunix.org
Mottagare: Bugtraq (import) <18950>
Ärende: ImmunixOS 7.0 sendmail update
------------------------------------------------------------
From: Immunix Security Team <security@wirex.com>
To: security-alerts@linuxsecurity.com, bugtraq@securityfocus.com,
 linux-security@lists.securityportal.com, immunix-announce@immunix.org
Message-ID: <20010824172534.E11991@wirex.com>

-----------------------------------------------------------------------
	Immunix OS Security Advisory

Packages updated:	sendmail
Affected products:	Immunix OS 7.0
Bugs fixed:		immunix/1615, immunix/1690
Date:			Thu Aug 23 2001
Advisory ID:		IMNX-2001-70-032-01
Author:			Seth Arnold <sarnold@wirex.com>
-----------------------------------------------------------------------

Description:
  This update fixes two problems with sendmail. The first is a fairly
  serious problem handing command line arguments that can lead to root
  privileges, discovered by Cade Cairns. The second is a race condition
  with the signal handling, discovered by Michal Zalewski, with root
  access a possibility.

  StackGuard protection from the first problem is minimal -- while it
  may prevent trivial exploits from running, StackGuard should not be
  counted an effective defense against this problem.

  We recommend users upgrade their sendmail as soon as
  possible. While Immunix OS 6.2 sendmail is not vulnerable to this
  problem (per Dave Ahmed's bugtraq post), we have not researched
  this issue -- Immunix OS 6.2 is no longer officially supported.

  References: http://www.securityfocus.com/archive/1/187126
  http://www.securityfocus.com/archive/1/187127
  http://www.securityfocus.com/bid/3163 

Package names and locations:
  Precompiled binary packages for Immunix 7.0 are available at:
  http://download.immunix.org/ImmunixOS/7.0/updates/RPMS/sendmail-8.11.6-1_imnx.i386.rpm
  http://download.immunix.org/ImmunixOS/7.0/updates/RPMS/sendmail-cf-8.11.6-1_imnx.i386.rpm
  http://download.immunix.org/ImmunixOS/7.0/updates/RPMS/sendmail-doc-8.11.6-1_imnx.i386.rpm

  Source package for Immunix 7.0 is available at:
  http://download.immunix.org/ImmunixOS/7.0/updates/SRPMS/sendmail-8.11.6-1_imnx.src.rpm

Immunix OS 7.0 md5sums:
  175d5a88678d02f1f50d788919e1e689  RPMS/sendmail-8.11.6-1_imnx.i386.rpm
  c999d8a7a9d4954085a38208bd7d3585  RPMS/sendmail-cf-8.11.6-1_imnx.i386.rpm
  b1ea88228ebb54e10f4e9c2ea95fb41d  RPMS/sendmail-doc-8.11.6-1_imnx.i386.rpm
  27873e65dadafb724d8384140ba9d1f2  SRPMS/sendmail-8.11.6-1_imnx.src.rpm

GPG verification:                                                               
  Our public key is available at <http://wirex.com/security/GPG_KEY>.           
  *** NOTE *** This key is different from the one used in advisories            
  IMNX-2001-70-020-01 and earlier.

Online version of all Immunix 6.2 updates and advisories:
  http://immunix.org/ImmunixOS/6.2/updates/

Online version of all Immunix 7.0-beta updates and advisories:
  http://immunix.org/ImmunixOS/7.0-beta/updates/

Online version of all Immunix 7.0 updates and advisories:
  http://immunix.org/ImmunixOS/7.0/updates/

NOTE:
  Ibiblio is graciously mirroring our updates, so if the links above are
  slow, please try:
    ftp://ftp.ibiblio.org/pub/Linux/distributions/immunix/
  or one of the many mirrors available at:
    http://www.ibiblio.org/pub/Linux/MIRRORS.html

Contact information:
  To report vulnerabilities, please contact security@wirex.com. WireX 
  attempts to conform to the RFP vulnerability disclosure protocol
  <http://www.wiretrip.net/rfp/policy.html>.
(6971022) /Immunix Security Team <security@wirex.com>/(Ombruten)