-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 National Cyber Alert System Technical Cyber Security Alert TA06-081A Sendmail Race Condition Vulnerability Original release date: March 22, 2006 Last revised: -- Source: US-CERT Systems Affected Sendmail versions prior to 8.13.6. Overview A race condition in Sendmail may allow a remote attacker to execute arbitrary code. I. Description Sendmail contains a race condition caused by the improper handling of asynchronous signals. In particular, by forcing the SMTP server to have an I/O timeout at exactly the correct instant, an attacker may be able to execute arbitrary code with the privileges of the Sendmail process. Details, including statements from affected vendors are available in the following Vulnerability Note: VU#834865 - Sendmail contains a race condition A race condition in Sendmail may allow a remote attacker to execute arbitrary code. (CVE-2006-0058) Please refer to the Sendmail MTA Security Vulnerability Advisory and the Sendmail version 8.13.6 release page for more information. II. Impact A remote, unauthenticated attacker could execute arbitrary code with the privileges of the Sendmail process. If Sendmail is running as root, the attacker could take complete control of an affected system. III. Solution Upgrade Sendmail Sendmail version 8.13.6 has been released to correct this issue. In addition to VU#834865, Sendmail 8.13.6 addresses other security issues and potential weaknesses in the Sendmail code. Patches to correct this issue in Sendmail versions 8.12.11 and 8.13.5 are also available. Appendix A. References * US-CERT Vulnerability Note VU#834865 - <http://www.kb.cert.org/vuls/id/834865> * Sendmail version 8.13.6 - <http://www.sendmail.org/8.13.6.html> * Sendmail MTA Security Vulnerability Advisory - <http://www.sendmail.com/company/advisory> * Sendmail version 8.12.11 Patch - <ftp://ftp.sendmail.org/pub/sendmail/8.12.11.p0> * Sendmail version 8.13.5 Patch - <ftp://ftp.sendmail.org/pub/sendmail/8.13.5.p0> * CVE-2006-0058 - <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0058> ____________________________________________________________________ The most recent version of this document can be found at: <http://www.us-cert.gov/cas/techalerts/TA06-081A.html> ____________________________________________________________________ Feedback can be directed to US-CERT Technical Staff. Please send email to <cert@xxxxxxxx> with "TA06-081A Feedback VU#834865" in the subject. ____________________________________________________________________ For instructions on subscribing to or unsubscribing from this mailing list, visit <http://www.us-cert.gov/cas/signup.html>. ____________________________________________________________________ Produced 2006 by US-CERT, a government organization. Terms of use: <http://www.us-cert.gov/legal.html> ____________________________________________________________________ Revision History Mar 22, 2006: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iQEVAwUBRCGC0X0pj593lg50AQLczAf+NzjAlt+FR5QXIayFTYL3RPVXuVU8RYtp i4a62FbF6bDQkVJZwWqusa1XCOaAk2HhIYbYHt2RDIKyXU8PlIs1VjtKCMzhfhNE HyJfBhfCJycU0udMsoH1IorH9bves2Ubog+mLS/eGMCcgNUJ+z3P/U8KukZfeRJi 5+jGrqksuz342XlI/9vKc9x3ateUrAyS2plbWc8wzxiG/T82hO7fCxz9mnd1V6zM Ub2iFAIpAbBhvEJOt7/IHxnmED/YaFF6JWbvWrZxXkLpcLFNKTN7j4pyX4ymqPmk rSoSXeCb5cc2ARBCyfsLY5+i96BxV0RgfcBXbT9mRjv7die16AoTXQ== =7/71 -----END PGP SIGNATURE-----