Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2015-03060

Опубликовано: 04 янв. 2010
Источник: fstec
CVSS2: 7.5
EPSS Низкий

Описание

Множественные уязвимости пакета rmail операционной системы Debian GNU/Linux, эксплуатация которых может привести к нарушению конфиденциальности, целостности и доступности защищаемой информации. Эксплуатация уязвимостей может быть осуществлена удаленно

Вендор

Сообщество свободного программного обеспечения

Наименование ПО

Debian GNU/Linux

Версия ПО

до 4 (Debian GNU/Linux)

Тип ПО

Операционная система

Операционные системы и аппаратные платформы

-

Уровень опасности уязвимости

Высокий уровень опасности (базовая оценка CVSS 2.0 составляет 7,5)

Возможные меры по устранению уязвимости

Проблема может быть решена обновлением операционной системы до следующих версий пакетов в зависимости от архитектуры:
Debian GNU/Linux 4:
ppc:
libmilter0 - 8.13.8-3+etch1
libmilter-dev - 8.13.8-3+etch1
sendmail-bin - 8.13.8-3+etch1
rmail - 8.13.8-3+etch1
sensible-mda - 8.13.8-3+etch1
libmilter0-dbg - 8.13.8-3+etch1
s390x:
libmilter0-dbg - 8.13.8-3+etch1
libmilter0 - 8.13.8-3+etch1
libmilter-dev - 8.13.8-3+etch1
sensible-mda - 8.13.8-3+etch1
rmail - 8.13.8-3+etch1
sendmail-bin - 8.13.8-3+etch1
i686:
libmilter0 - 8.13.8-3+etch1
sendmail-bin - 8.13.8-3+etch1
rmail - 8.13.8-3+etch1
libmilter-dev - 8.13.8-3+etch1
sensible-mda - 8.13.8-3+etch1
libmilter0-dbg - 8.13.8-3+etch1
hppa:
rmail - 8.13.8-3+etch1
sensible-mda - 8.13.8-3+etch1
libmilter0 - 8.13.8-3+etch1
libmilter0-dbg - 8.13.8-3+etch1
sendmail-bin - 8.13.8-3+etch1
libmilter-dev - 8.13.8-3+etch1
sparc:
rmail - 8.13.8-3+etch1
libmilter0-dbg - 8.13.8-3+etch1
sendmail-bin - 8.13.8-3+etch1
libmilter-dev - 8.13.8-3+etch1
libmilter0 - 8.13.8-3+etch1
sensible-mda - 8.13.8-3+etch1
x86-64:
sensible-mda - 8.13.8-3+etch1
sendmail-bin - 8.13.8-3+etch1
libmilter-dev - 8.13.8-3+etch1
libmilter0-dbg - 8.13.8-3+etch1
libmilter0 - 8.13.8-3+etch1
rmail - 8.13.8-3+etch1
ia64:
libmilter0-dbg - 8.13.8-3+etch1
sensible-mda - 8.13.8-3+etch1
libmilter0 - 8.13.8-3+etch1
rmail - 8.13.8-3+etch1
libmilter-dev - 8.13.8-3+etch1
sendmail-bin - 8.13.8-3+etch1
alpha:
sensible-mda - 8.13.8-3+etch1
libmilter0 - 8.13.8-3+etch1
libmilter0-dbg - 8.13.8-3+etch1
rmail - 8.13.8-3+etch1
libmilter-dev - 8.13.8-3+etch1
sendmail-bin - 8.13.8-3+etch1
noarch:
sendmail-cf - 8.13.8-3+etch1
sendmail-doc - 8.13.8-3+etch1
sendmail - 8.13.8-3+etch1
sendmail-base - 8.13.8-3+etch1
mipsel:
sendmail-bin - 8.13.8-3+etch1
libmilter0-dbg - 8.13.8-3+etch1
libmilter0 - 8.13.8-3+etch1
libmilter-dev - 8.13.8-3+etch1
sensible-mda - 8.13.8-3+etch1
rmail - 8.13.8-3+etch1
arm:
sensible-mda - 8.13.8-3+etch1
libmilter0-dbg - 8.13.8-3+etch1
sendmail-bin - 8.13.8-3+etch1
libmilter-dev - 8.13.8-3+etch1
rmail - 8.13.8-3+etch1
libmilter0 - 8.13.8-3+etch1
Debian GNU/Linux 5:
ppc:
sendmail-bin - 8.14.3-5+lenny1
libmilter1.0.1-dbg - 8.14.3-5+lenny1
sensible-mda - 8.14.3-5+lenny1
libmilter1.0.1 - 8.14.3-5+lenny1
libmilter-dev - 8.14.3-5+lenny1
rmail - 8.14.3-5+lenny1
s390x:
rmail - 8.14.3-5+lenny1
sendmail-bin - 8.14.3-5+lenny1
libmilter1.0.1-dbg - 8.14.3-5+lenny1
libmilter-dev - 8.14.3-5+lenny1
libmilter1.0.1 - 8.14.3-5+lenny1
sensible-mda - 8.14.3-5+lenny1
i686:
rmail - 8.14.3-5+lenny1
sensible-mda - 8.14.3-5+lenny1
libmilter1.0.1 - 8.14.3-5+lenny1
libmilter1.0.1-dbg - 8.14.3-5+lenny1
libmilter-dev - 8.14.3-5+lenny1
sendmail-bin - 8.14.3-5+lenny1
hppa:
sendmail-bin - 8.14.3-5+lenny1
rmail - 8.14.3-5+lenny1
libmilter1.0.1 - 8.14.3-5+lenny1
sensible-mda - 8.14.3-5+lenny1
libmilter-dev - 8.14.3-5+lenny1
libmilter1.0.1-dbg - 8.14.3-5+lenny1
sparc:
sensible-mda - 8.14.3-5+lenny1
libmilter1.0.1 - 8.14.3-5+lenny1
libmilter-dev - 8.14.3-5+lenny1
sendmail-bin - 8.14.3-5+lenny1
rmail - 8.14.3-5+lenny1
libmilter1.0.1-dbg - 8.14.3-5+lenny1
x86-64:
sensible-mda - 8.14.3-5+lenny1
libmilter1.0.1-dbg - 8.14.3-5+lenny1
rmail - 8.14.3-5+lenny1
libmilter-dev - 8.14.3-5+lenny1
sendmail-bin - 8.14.3-5+lenny1
libmilter1.0.1 - 8.14.3-5+lenny1
armel:
libmilter1.0.1-dbg - 8.14.3-5+lenny1
libmilter-dev - 8.14.3-5+lenny1
libmilter1.0.1 - 8.14.3-5+lenny1
rmail - 8.14.3-5+lenny1
sensible-mda - 8.14.3-5+lenny1
sendmail-bin - 8.14.3-5+lenny1
alpha:
libmilter1.0.1-dbg - 8.14.3-5+lenny1
libmilter-dev - 8.14.3-5+lenny1
libmilter1.0.1 - 8.14.3-5+lenny1
rmail - 8.14.3-5+lenny1
sendmail-bin - 8.14.3-5+lenny1
sensible-mda - 8.14.3-5+lenny1
ia64:
rmail - 8.14.3-5+lenny1
sendmail-bin - 8.14.3-5+lenny1
libmilter1.0.1 - 8.14.3-5+lenny1
libmilter1.0.1-dbg - 8.14.3-5+lenny1
sensible-mda - 8.14.3-5+lenny1
libmilter-dev - 8.14.3-5+lenny1
mips:
sendmail-bin - 8.14.3-5+lenny1
libmilter1.0.1 - 8.14.3-5+lenny1
rmail - 8.14.3-5+lenny1
libmilter-dev - 8.14.3-5+lenny1
sensible-mda - 8.14.3-5+lenny1
libmilter1.0.1-dbg - 8.14.3-5+lenny1
noarch:
sendmail-cf - 8.14.3-5+lenny1
sendmail-doc - 8.14.3-5+lenny1
sendmail - 8.14.3-5+lenny1
sendmail-base - 8.14.3-5+lenny1
mipsel:
libmilter1.0.1-dbg - 8.14.3-5+lenny1
sensible-mda - 8.14.3-5+lenny1
sendmail-bin - 8.14.3-5+lenny1
rmail - 8.14.3-5+lenny1
libmilter1.0.1 - 8.14.3-5+lenny1
libmilter-dev - 8.14.3-5+lenny1
arm:
libmilter1.0.1 - 8.14.3-5+lenny1
rmail - 8.14.3-5+lenny1
libmilter-dev - 8.14.3-5+lenny1
sendmail-bin - 8.14.3-5+lenny1
libmilter1.0.1-dbg - 8.14.3-5+lenny1
sensible-mda - 8.14.3-5+lenny1

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 76%
0.00988
Низкий

7.5 High

CVSS2

Связанные уязвимости

ubuntu
больше 15 лет назад

sendmail before 8.14.4 does not properly handle a '\0' character in a Common Name (CN) field of an X.509 certificate, which (1) allows man-in-the-middle attackers to spoof arbitrary SSL-based SMTP servers via a crafted server certificate issued by a legitimate Certification Authority, and (2) allows remote attackers to bypass intended access restrictions via a crafted client certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.

redhat
больше 15 лет назад

sendmail before 8.14.4 does not properly handle a '\0' character in a Common Name (CN) field of an X.509 certificate, which (1) allows man-in-the-middle attackers to spoof arbitrary SSL-based SMTP servers via a crafted server certificate issued by a legitimate Certification Authority, and (2) allows remote attackers to bypass intended access restrictions via a crafted client certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.

nvd
больше 15 лет назад

sendmail before 8.14.4 does not properly handle a '\0' character in a Common Name (CN) field of an X.509 certificate, which (1) allows man-in-the-middle attackers to spoof arbitrary SSL-based SMTP servers via a crafted server certificate issued by a legitimate Certification Authority, and (2) allows remote attackers to bypass intended access restrictions via a crafted client certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.

debian
больше 15 лет назад

sendmail before 8.14.4 does not properly handle a '\0' character in a ...

github
около 3 лет назад

sendmail before 8.14.4 does not properly handle a '\0' character in a Common Name (CN) field of an X.509 certificate, which (1) allows man-in-the-middle attackers to spoof arbitrary SSL-based SMTP servers via a crafted server certificate issued by a legitimate Certification Authority, and (2) allows remote attackers to bypass intended access restrictions via a crafted client certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.

EPSS

Процентиль: 76%
0.00988
Низкий

7.5 High

CVSS2