Note: This bug is displayed in read-only format because the product is no longer active in Red Hat Bugzilla.
For bugs related to Red Hat Enterprise Linux 2.1 product line. For Red Hat Enterprise Linux 6 and above, please visit Red Hat JIRA https://issues.redhat.com/secure/CreateIssue!default.jspa?pid=12332745 to report new issues.

Bug 104565

Summary: CAN-2003-0694 Sendmail possible remote exploit
Product: Red Hat Enterprise Linux 2.1 Reporter: Mark J. Cox <mjc>
Component: sendmailAssignee: Florian La Roche <laroche>
Status: CLOSED ERRATA QA Contact: David Lawrence <dkl>
Severity: medium Docs Contact:
Priority: high    
Version: 2.1Keywords: Security
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2003-09-17 20:09:02 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Mark J. Cox 2003-09-17 09:47:53 UTC
There is a bug in the prescan() function of Sendmail versions prior to and
including 8.12.9. The sucessful exploitation of this bug can lead to heap
and stack structure overflows. Although no exploit currently exists, this
issue is locally exploitable and may also be remotely exploitable.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2003-0694 to this issue.

Michal Zalewski notified us of this issue Sep16 due to be public Sep23, although
it may have leaked http://hedera.linuxnews.pl/_news/2003/09/17/_long/2170.html

Keeping bug as private until we have confirmation that it is now public

RHSA-2003:284 in progress with security fix

Comment 1 Mark J. Cox 2003-09-17 13:20:25 UTC
http://marc.theaimsgroup.com/?l=full-disclosure&m=106380379904974
now public

Comment 2 Mark J. Cox 2003-09-17 20:09:02 UTC
fixed http://rhn.redhat.com/errata/RHSA-2003-280.html