From aliz@gentoo.org Mon Oct 14 04:38:00 2002 From: Daniel Ahlberg To: full-disclosure@lists.netsys.com Date: Sun, 13 Oct 2002 16:48:21 +0200 Subject: [Full-Disclosure] GLSA: sendmail -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - -------------------------------------------------------------------- GENTOO LINUX SECURITY ANNOUNCEMENT - - -------------------------------------------------------------------- PACKAGE        :sendmail SUMMARY        :smsrh bypass vulnerabilites DATE           :2002-10-13 14:45 UTC - - -------------------------------------------------------------------- It is possible for an attacker to bypass the restrictions imposed by The Sendmail Consortium^Òs Restricted Shell (SMRSH) and execute a binary of his choosing by inserting a special character sequence into his .forward file. Read the full advisory at http://www.sendmail.org/smrsh.adv.txt SOLUTION It is recommended that all Gentoo Linux users who are running net-mail/sendmail-8.12.6 and earlier update their systems as follows: emerge rsync emerge sendmail emerge clean - - -------------------------------------------------------------------- aliz@gentoo.org - GnuPG key is available at www.gentoo.org/~aliz - - -------------------------------------------------------------------- -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.7 (GNU/Linux) iD8DBQE9qYe0fT7nyhUpoZMRAikZAJ401MoPiOSGimzqUq25IPj7sNIrIwCghsXn pXPevOcEyJm89c2k67OIA9g= =8Hz5 -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html