81165 2002-10-15 00:31 /42 rader/ Daniel Ahlberg <aliz@gentoo.org> Importerad: 2002-10-15 00:31 av Brevbäraren Extern mottagare: bugtraq@securityfocus.com Mottagare: Bugtraq (import) <1922> Ärende: GLSA: sendmail ------------------------------------------------------------ -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - -------------------------------------------------------------------- GENTOO LINUX SECURITY ANNOUNCEMENT - - -------------------------------------------------------------------- PACKAGE :sendmail SUMMARY :smsrh bypass vulnerabilites DATE :2002-10-13 14:45 UTC - - -------------------------------------------------------------------- It is possible for an attacker to bypass the restrictions imposed by The Sendmail Consortiums Restricted Shell (SMRSH) and execute a binary of his choosing by inserting a special character sequence into his .forward file. Read the full advisory at http://www.sendmail.org/smrsh.adv.txt SOLUTION It is recommended that all Gentoo Linux users who are running net-mail/sendmail-8.12.6 and earlier update their systems as follows: emerge rsync emerge sendmail emerge clean - - -------------------------------------------------------------------- aliz@gentoo.org - GnuPG key is available at www.gentoo.org/~aliz - - -------------------------------------------------------------------- -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.7 (GNU/Linux) iD8DBQE9qYe0fT7nyhUpoZMRAikZAJ401MoPiOSGimzqUq25IPj7sNIrIwCghsXn pXPevOcEyJm89c2k67OIA9g= =8Hz5 -----END PGP SIGNATURE----- (81165) /Daniel Ahlberg <aliz@gentoo.org>/----------