Vulnerabilities > CVE-2006-0058 - Unspecified vulnerability in Sendmail
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Signal handler race condition in Sendmail 8.13.x before 8.13.6 allows remote attackers to execute arbitrary code by triggering timeouts in a way that causes the setjmp and longjmp function calls to be interrupted and modify unexpected memory locations.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 6 |
Exploit-Db
description | Sendmail <= 8.13.5 Remote Signal Handling Exploit PoC. CVE-2006-0058. Dos exploit for linux platform |
id | EDB-ID:2051 |
last seen | 2016-01-31 |
modified | 2006-07-21 |
published | 2006-07-21 |
reporter | redsand |
source | https://www.exploit-db.com/download/2051/ |
title | Sendmail <= 8.13.5 - Remote Signal Handling Exploit PoC |
Nessus
NASL family HP-UX Local Security Checks NASL id HPUX_PHNE_35483.NASL description s700_800 11.00 sendmail(1M) 8.9.3 patch : The remote HP-UX host is affected by multiple vulnerabilities : - A potential security vulnerability has been identified with HP-UX running sendmail, where the vulnerability may be exploited remotely to gain unauthorized access and create a Denial of Service (DoS). References: CERT CA-2003-07, CAN-2002-1337. (HPSBUX00246 SSRT3469) - A vulnerability has been identified in sendmail which may allow a remote attacker to execute arbitrary code. References: CVE-2006-0058, US-CERT VU#834865. (HPSBUX02108 SSRT061133) - A potential security vulnerability has been identified with HP-UX running sendmail, where the vulnerability could be exploited remotely to gain unauthorized privileged access. References: CERT/CC CA-2003-25, CAN-2003-0681. (HPSBUX00281 SSRT3631) - A potential security vulnerability has been identified with HP-UX sendmail, where the vulnerability may be exploited remotely to gain unauthorized access or create a denial of service (DoS). References: CERT CA-2003-12. (HPSBUX00253 SSRT3531) - A potential security vulnerability has been identified with HP-UX running sendmail. This vulnerability could allow a remote user to cause a Denial of Service (DoS). (HPSBUX02183 SSRT061243) last seen 2020-06-01 modified 2020-06-02 plugin id 26133 published 2007-09-25 reporter This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/26133 title HP-UX PHNE_35483 : s700_800 11.00 sendmail(1M) 8.9.3 patch code # # (C) Tenable Network Security, Inc. # # The descriptive text and patch checks in this plugin were # extracted from HP patch PHNE_35483. The text itself is # copyright (C) Hewlett-Packard Development Company, L.P. # include("compat.inc"); if (description) { script_id(26133); script_version("1.22"); script_cvs_date("Date: 2019/07/10 16:04:13"); script_cve_id("CVE-2002-1337", "CVE-2003-0161", "CVE-2003-0681", "CVE-2003-0694", "CVE-2006-0058", "CVE-2007-2246"); script_bugtraq_id(6991); script_xref(name:"CERT-CC", value:"2003-07"); script_xref(name:"CERT-CC", value:"2003-12"); script_xref(name:"CERT-CC", value:"2003-25"); script_xref(name:"CERT", value:"834865"); script_xref(name:"HP", value:"emr_na-c00629555"); script_xref(name:"HP", value:"emr_na-c00841370"); script_xref(name:"HP", value:"emr_na-c00958338"); script_xref(name:"HP", value:"emr_na-c00958571"); script_xref(name:"HP", value:"emr_na-c01035741"); script_xref(name:"HP", value:"HPSBUX00246"); script_xref(name:"HP", value:"HPSBUX00253"); script_xref(name:"HP", value:"HPSBUX00281"); script_xref(name:"HP", value:"HPSBUX02108"); script_xref(name:"HP", value:"HPSBUX02183"); script_xref(name:"HP", value:"SSRT061133"); script_xref(name:"HP", value:"SSRT061243"); script_xref(name:"HP", value:"SSRT3469"); script_xref(name:"HP", value:"SSRT3531"); script_xref(name:"HP", value:"SSRT3631"); script_name(english:"HP-UX PHNE_35483 : s700_800 11.00 sendmail(1M) 8.9.3 patch"); script_summary(english:"Checks for the patch in the swlist output"); script_set_attribute( attribute:"synopsis", value:"The remote HP-UX host is missing a security-related patch." ); script_set_attribute( attribute:"description", value: "s700_800 11.00 sendmail(1M) 8.9.3 patch : The remote HP-UX host is affected by multiple vulnerabilities : - A potential security vulnerability has been identified with HP-UX running sendmail, where the vulnerability may be exploited remotely to gain unauthorized access and create a Denial of Service (DoS). References: CERT CA-2003-07, CAN-2002-1337. (HPSBUX00246 SSRT3469) - A vulnerability has been identified in sendmail which may allow a remote attacker to execute arbitrary code. References: CVE-2006-0058, US-CERT VU#834865. (HPSBUX02108 SSRT061133) - A potential security vulnerability has been identified with HP-UX running sendmail, where the vulnerability could be exploited remotely to gain unauthorized privileged access. References: CERT/CC CA-2003-25, CAN-2003-0681. (HPSBUX00281 SSRT3631) - A potential security vulnerability has been identified with HP-UX sendmail, where the vulnerability may be exploited remotely to gain unauthorized access or create a denial of service (DoS). References: CERT CA-2003-12. (HPSBUX00253 SSRT3531) - A potential security vulnerability has been identified with HP-UX running sendmail. This vulnerability could allow a remote user to cause a Denial of Service (DoS). (HPSBUX02183 SSRT061243)" ); # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00958338 script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?7e44f628" ); # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00958571 script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?b715e4f4" ); # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01035741 script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?8ac166f8" ); # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00629555 script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?f41ededc" ); # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00841370 script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?6b002323" ); script_set_attribute( attribute:"solution", value:"Install patch PHNE_35483 or subsequent." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_set_attribute(attribute:"exploited_by_malware", value:"true"); script_cwe_id(399); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/o:hp:hp-ux"); script_set_attribute(attribute:"vuln_publication_date", value:"2003/03/07"); script_set_attribute(attribute:"patch_publication_date", value:"2007/01/03"); script_set_attribute(attribute:"plugin_publication_date", value:"2007/09/25"); script_set_attribute(attribute:"patch_modification_date", value:"2007/04/17"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"HP-UX Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/HP-UX/version", "Host/HP-UX/swlist"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("hpux.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/HP-UX/version")) audit(AUDIT_OS_NOT, "HP-UX"); if (!get_kb_item("Host/HP-UX/swlist")) audit(AUDIT_PACKAGE_LIST_MISSING); if (!hpux_check_ctx(ctx:"11.00")) { exit(0, "The host is not affected since PHNE_35483 applies to a different OS release."); } patches = make_list("PHNE_35483"); foreach patch (patches) { if (hpux_installed(app:patch)) { exit(0, "The host is not affected because patch "+patch+" is installed."); } } flag = 0; if (hpux_check_patch(app:"InternetSrvcs.INET-ENG-A-MAN", version:"B.11.00")) flag++; if (hpux_check_patch(app:"InternetSrvcs.INETSVCS-RUN", version:"B.11.00")) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:hpux_report_get()); else security_hole(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2006-0264.NASL description Updated sendmail packages to fix a security issue are now available for Red Hat Enterprise Linux 3 and 4. This update has been rated as having critical security impact by the Red Hat Security Response Team. Sendmail is a Mail Transport Agent (MTA) used to send mail between machines. A flaw in the handling of asynchronous signals was discovered in Sendmail. A remote attacker may be able to exploit a race condition to execute arbitrary code as root. The Common Vulnerabilities and Exposures project assigned the name CVE-2006-0058 to this issue. By default on Red Hat Enterprise Linux 3 and 4, Sendmail is configured to only accept connections from the local host. Therefore, only users who have configured Sendmail to listen to remote hosts would be able to be remotely exploited by this vulnerability. Users of Sendmail are advised to upgrade to these erratum packages, which contain a backported patch from the Sendmail team to correct this issue. last seen 2020-06-01 modified 2020-06-02 plugin id 21134 published 2006-03-23 reporter This script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/21134 title RHEL 3 / 4 : sendmail (RHSA-2006:0264) NASL family Solaris Local Security Checks NASL id SOLARIS10_122856.NASL description SunOS 5.10: sendmail patch. Date this patch was last updated by Sun : Oct/17/06 last seen 2018-09-01 modified 2018-08-13 plugin id 21260 published 2006-04-21 reporter Tenable source https://www.tenable.com/plugins/index.php?view=single&id=21260 title Solaris 10 (sparc) : 122856-03 NASL family Debian Local Security Checks NASL id DEBIAN_DSA-1015.NASL description Mark Dowd discovered a flaw in the handling of asynchronous signals in sendmail, a powerful, efficient, and scalable mail transport agent. This allows a remote attacker to exploit a race condition to execute arbitrary code as root. last seen 2020-06-01 modified 2020-06-02 plugin id 22557 published 2006-10-14 reporter This script is Copyright (C) 2006-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/22557 title Debian DSA-1015-1 : sendmail - programming error NASL family Solaris Local Security Checks NASL id SOLARIS8_110615.NASL description SunOS 5.8: sendmail patch. Date this patch was last updated by Sun : Jan/18/08 last seen 2020-06-01 modified 2020-06-02 plugin id 13350 published 2004-07-12 reporter This script is Copyright (C) 2004-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/13350 title Solaris 8 (sparc) : 110615-18 NASL family Solaris Local Security Checks NASL id SOLARIS9_113575.NASL description SunOS 5.9: sendmail patch. Date this patch was last updated by Sun : Feb/05/08 last seen 2020-06-01 modified 2020-06-02 plugin id 13541 published 2004-07-12 reporter This script is Copyright (C) 2004-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/13541 title Solaris 9 (sparc) : 113575-11 NASL family FreeBSD Local Security Checks NASL id FREEBSD_PKG_08AC7B8BBB3011DAB2FB000E0C2E438A.NASL description Problem Description A race condition has been reported to exist in the handling by sendmail of asynchronous signals. Impact A remote attacker may be able to execute arbitrary code with the privileges of the user running sendmail, typically root. Workaround There is no known workaround other than disabling sendmail. last seen 2020-06-01 modified 2020-06-02 plugin id 21381 published 2006-05-13 reporter This script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/21381 title FreeBSD : sendmail -- race condition vulnerability (08ac7b8b-bb30-11da-b2fb-000e0c2e438a) NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-200603-21.NASL description The remote host is affected by the vulnerability described in GLSA-200603-21 (Sendmail: Race condition in the handling of asynchronous signals) ISS discovered that Sendmail is vulnerable to a race condition in the handling of asynchronous signals. Impact : An attacker could exploit this via certain crafted timing conditions. Workaround : There is no known workaround at this time. last seen 2020-06-01 modified 2020-06-02 plugin id 21128 published 2006-03-23 reporter This script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/21128 title GLSA-200603-21 : Sendmail: Race condition in the handling of asynchronous signals NASL family AIX Local Security Checks NASL id AIX_U805069.NASL description The remote host is missing AIX PTF U805069, which is related to the security of the package bos.net.tcp.client. last seen 2020-06-01 modified 2020-06-02 plugin id 65291 published 2013-03-13 reporter This script is Copyright (C) 2013-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/65291 title AIX 5.3 TL 4 / 5.3 TL 5 : bos.net.tcp.client (U805069) NASL family HP-UX Local Security Checks NASL id HPUX_PHNE_35485.NASL description s700_800 11.23 sendmail(1M) 8.11.1 patch : The remote HP-UX host is affected by multiple vulnerabilities : - A potential security vulnerability has been identified with HP-UX running sendmail. This vulnerability could allow a remote user to cause a Denial of Service (DoS). (HPSBUX02183 SSRT061243) - A vulnerability has been identified in sendmail which may allow a remote attacker to execute arbitrary code. References: CVE-2006-0058, US-CERT VU#834865. (HPSBUX02108 SSRT061133) - A potential security vulnerability has been identified with HP-UX running sendmail, where the vulnerability could be exploited remotely to gain unauthorized privileged access. References: CERT/CC CA-2003-25, CAN-2003-0681. (HPSBUX00281 SSRT3631) last seen 2020-06-01 modified 2020-06-02 plugin id 26135 published 2007-09-25 reporter This script is Copyright (C) 2007-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/26135 title HP-UX PHNE_35485 : s700_800 11.23 sendmail(1M) 8.11.1 patch NASL family HP-UX Local Security Checks NASL id HPUX_PHNE_32006.NASL description s700_800 11.00 sendmail(1m) 8.9.3 patch : A vulnerability has been identified in sendmail which may allow a remote attacker to execute arbitrary code. References: CVE-2006-0058, US-CERT VU#834865. last seen 2020-06-01 modified 2020-06-02 plugin id 21653 published 2006-06-06 reporter This script is Copyright (C) 2006-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/21653 title HP-UX PHNE_32006 : HP-UX Running sendmail, Remote Execution of Arbitrary Code (HPSBUX02108 SSRT061133 rev.15) NASL family HP-UX Local Security Checks NASL id HPUX_PHNE_35484.NASL description s700_800 11.11 sendmail(1M) 8.9.3 patch : The remote HP-UX host is affected by multiple vulnerabilities : - A potential security vulnerability has been identified with HP-UX running sendmail, where the vulnerability could be exploited remotely to gain unauthorized privileged access. References: CERT/CC CA-2003-25, CAN-2003-0681. (HPSBUX00281 SSRT3631) - A vulnerability has been identified in sendmail which may allow a remote attacker to execute arbitrary code. References: CVE-2006-0058, US-CERT VU#834865. (HPSBUX02108 SSRT061133) - A potential security vulnerability has been identified with HP-UX sendmail, where the vulnerability may be exploited remotely to gain unauthorized access or create a denial of service (DoS). References: CERT CA-2003-12. (HPSBUX00253 SSRT3531) - A potential security vulnerability has been identified with HP-UX running sendmail. This vulnerability could allow a remote user to cause a Denial of Service (DoS). (HPSBUX02183 SSRT061243) - A potential security vulnerability has been identified with HP-UX running sendmail, where the vulnerability may be exploited remotely to gain unauthorized access and create a Denial of Service (DoS). References: CERT CA-2003-07, CAN-2002-1337. (HPSBUX00246 SSRT3469) last seen 2020-06-01 modified 2020-06-02 plugin id 26134 published 2007-09-25 reporter This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/26134 title HP-UX PHNE_35484 : s700_800 11.11 sendmail(1M) 8.9.3 patch NASL family Mandriva Local Security Checks NASL id MANDRAKE_MDKSA-2006-058.NASL description A race condition was reported in sendmail in how it handles asynchronous signals. This could allow a remote attacker to be able to execute arbitrary code with the privileges of the user running sendmail. The updated packages have been patched to correct this problem via a patch provided by the Sendmail Consortium via CERT. last seen 2020-06-01 modified 2020-06-02 plugin id 21132 published 2006-03-23 reporter This script is Copyright (C) 2006-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/21132 title Mandrake Linux Security Advisory : sendmail (MDKSA-2006:058) NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2006-0265.NASL description Updated sendmail packages to fix a security issue are now available for Red Hat Enterprise Linux 2.1. This update has been rated as having critical security impact by the Red Hat Security Response Team. Sendmail is a Mail Transport Agent (MTA) used to send mail between machines. A flaw in the handling of asynchronous signals was discovered in Sendmail. A remote attacker may be able to exploit a race condition to execute arbitrary code as root. The Common Vulnerabilities and Exposures project assigned the name CVE-2006-0058 to this issue. By default on Red Hat Enterprise Linux 2.1, Sendmail is configured to only accept connections from the local host. Therefore only users who have configured Sendmail to listen to remote hosts would be able to be remotely exploited by this vulnerability. In order to correct this issue for Red Hat Enterprise Linux 2.1 users, it was necessary to upgrade the version of Sendmail from 8.11 as originally shipped to Sendmail 8.12 with the addition of the security patch supplied by Sendmail Inc. This erratum provides updated packages based on Sendmail 8.12 with a compatibility mode enabled. After updating to these packages, users should pay close attention to their sendmail logs to ensure that the upgrade completed sucessfully. last seen 2020-06-01 modified 2020-06-02 plugin id 21135 published 2006-03-23 reporter This script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/21135 title RHEL 2.1 : sendmail (RHSA-2006:0265) NASL family HP-UX Local Security Checks NASL id HPUX_PHNE_34927.NASL description s700_800 11.04 (VVOS) sendmail(1m) 8.9.3 patch : The remote HP-UX host is affected by multiple vulnerabilities : - A vulnerability has been identified in sendmail which may allow a remote attacker to execute arbitrary code. References: CVE-2006-0058, US-CERT VU#834865. (HPSBUX02108 SSRT061133) - A potential security vulnerability has been identified with HP-UX running Sendmail processing malformed multipart MIME messages. This vulnerability could potentially allow a remote unauthenticated user to cause a Denial of Service (DoS). (HPSBUX02124 SSRT061159) last seen 2020-06-01 modified 2020-06-02 plugin id 22175 published 2006-08-08 reporter This script is Copyright (C) 2006-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/22175 title HP-UX PHNE_34927 : s700_800 11.04 (VVOS) sendmail(1m) 8.9.3 patch NASL family Solaris Local Security Checks NASL id SOLARIS8_X86_110616.NASL description SunOS 5.8_x86: sendmail patch. Date this patch was last updated by Sun : Feb/04/08 last seen 2020-06-01 modified 2020-06-02 plugin id 13454 published 2004-07-12 reporter This script is Copyright (C) 2004-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/13454 title Solaris 8 (x86) : 110616-18 NASL family CentOS Local Security Checks NASL id CENTOS_RHSA-2006-0264.NASL description Updated sendmail packages to fix a security issue are now available for Red Hat Enterprise Linux 3 and 4. This update has been rated as having critical security impact by the Red Hat Security Response Team. Sendmail is a Mail Transport Agent (MTA) used to send mail between machines. A flaw in the handling of asynchronous signals was discovered in Sendmail. A remote attacker may be able to exploit a race condition to execute arbitrary code as root. The Common Vulnerabilities and Exposures project assigned the name CVE-2006-0058 to this issue. By default on Red Hat Enterprise Linux 3 and 4, Sendmail is configured to only accept connections from the local host. Therefore, only users who have configured Sendmail to listen to remote hosts would be able to be remotely exploited by this vulnerability. Users of Sendmail are advised to upgrade to these erratum packages, which contain a backported patch from the Sendmail team to correct this issue. last seen 2020-06-01 modified 2020-06-02 plugin id 21893 published 2006-07-03 reporter This script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/21893 title CentOS 3 / 4 : sendmail (CESA-2006:0264) NASL family Fedora Local Security Checks NASL id FEDORA_2006-194.NASL description Fixes CVE-2006-0058 : A flaw in the handling of asynchronous signals. A remote attacker may be able to exploit a race condition to execute arbitrary code as root. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 21191 published 2006-04-08 reporter This script is Copyright (C) 2006-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/21191 title Fedora Core 4 : sendmail-8.13.6-0.FC4.1 (2006-194) NASL family Slackware Local Security Checks NASL id SLACKWARE_SSA_2006-081-01.NASL description New sendmail packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2, and -current to fix a security issue. Sendmail last seen 2020-06-01 modified 2020-06-02 plugin id 21121 published 2006-03-23 reporter This script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/21121 title Slackware 10.0 / 10.1 / 10.2 / 8.1 / 9.0 / 9.1 / current : sendmail (SSA:2006-081-01) NASL family Solaris Local Security Checks NASL id SOLARIS9_X86_114137.NASL description SunOS 5.9_x86: sendmail Patch. Date this patch was last updated by Sun : Mar/04/08 last seen 2020-06-01 modified 2020-06-02 plugin id 13592 published 2004-07-12 reporter This script is Copyright (C) 2004-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/13592 title Solaris 9 (x86) : 114137-10 NASL family Fedora Local Security Checks NASL id FEDORA_2006-193.NASL description Fixes CVE-2006-0058 : A flaw in the handling of asynchronous signals. A remote attacker may be able to exploit a race condition to execute arbitrary code as root. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 21190 published 2006-04-08 reporter This script is Copyright (C) 2006-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/21190 title Fedora Core 5 : sendmail-8.13.6-0.FC5.1 (2006-193) NASL family AIX Local Security Checks NASL id AIX_U806006.NASL description The remote host is missing AIX PTF U806006, which is related to the security of the package bos.net.tcp.client. last seen 2020-06-01 modified 2020-06-02 plugin id 65293 published 2013-03-13 reporter This script is Copyright (C) 2013-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/65293 title AIX 5.2 TL 8 : bos.net.tcp.client (U806006)
Oval
accepted 2013-04-29T04:11:17.848-04:00 class vulnerability contributors name Aharon Chernin organization SCAP.com, LLC name Dragos Prisaca organization G2, Inc.
definition_extensions comment The operating system installed on the system is Red Hat Enterprise Linux 3 oval oval:org.mitre.oval:def:11782 comment CentOS Linux 3.x oval oval:org.mitre.oval:def:16651 comment The operating system installed on the system is Red Hat Enterprise Linux 4 oval oval:org.mitre.oval:def:11831 comment CentOS Linux 4.x oval oval:org.mitre.oval:def:16636 comment Oracle Linux 4.x oval oval:org.mitre.oval:def:15990
description Signal handler race condition in Sendmail 8.13.x before 8.13.6 allows remote attackers to execute arbitrary code by triggering timeouts in a way that causes the setjmp and longjmp function calls to be interrupted and modify unexpected memory locations. family unix id oval:org.mitre.oval:def:11074 status accepted submitted 2010-07-09T03:56:16-04:00 title Signal handler race condition in Sendmail 8.13.x before 8.13.6 allows remote attackers to execute arbitrary code by triggering timeouts in a way that causes the setjmp and longjmp function calls to be interrupted and modify unexpected memory locations. version 26 accepted 2013-04-22T04:00:13.977-04:00 class vulnerability contributors name Robert L. Hollis organization ThreatGuard, Inc. name Vladimir Giszpenc organization DSCI Contractor name Sudhir Gandhe organization Secure Elements, Inc. name Shane Shaffer organization G2, Inc.
definition_extensions comment The operating system installed on the system is Red Hat Enterprise Linux 4 for x86 oval oval:org.mitre.oval:def:1734 comment The operating system installed on the system is Red Hat Enterprise Linux 3 for x86 oval oval:org.mitre.oval:def:5537 comment The operating system installed on the system is Red Hat Enterprise Linux 3 for x86 oval oval:org.mitre.oval:def:5537 comment The operating system installed on the system is Red Hat Enterprise Linux 4 for x86 oval oval:org.mitre.oval:def:1734
description Signal handler race condition in Sendmail 8.13.x before 8.13.6 allows remote attackers to execute arbitrary code by triggering timeouts in a way that causes the setjmp and longjmp function calls to be interrupted and modify unexpected memory locations. family unix id oval:org.mitre.oval:def:1689 status accepted submitted 2006-03-27T09:51:00.000-04:00 title Sendmail setjmp longjmp bo (Red Hat Internal) version 40
Redhat
advisories |
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
rpms |
|
References
- http://www.redhat.com/support/errata/RHSA-2006-0264.html
- http://www.redhat.com/support/errata/RHSA-2006-0265.html
- http://www.securityfocus.com/archive/1/428536/100/0/threaded
- http://www.sendmail.com/company/advisory/index.shtml
- http://www.debian.org/security/2006/dsa-1015
- http://www.gentoo.org/security/en/glsa/glsa-200603-21.xml
- http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.007-sendmail.html
- http://www.us-cert.gov/cas/techalerts/TA06-081A.html
- http://www.kb.cert.org/vuls/id/834865
- http://secunia.com/advisories/19342
- http://secunia.com/advisories/19363
- http://secunia.com/advisories/19367
- ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:13.sendmail.asc
- http://www.novell.com/linux/security/advisories/2006_17_sendmail.html
- http://support.avaya.com/elmodocs2/security/ASA-2006-074.htm
- http://www.openbsd.org/errata38.html#sendmail
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-102262-1
- http://www.securityfocus.com/bid/17192
- http://www.osvdb.org/24037
- http://securitytracker.com/id?1015801
- http://secunia.com/advisories/19368
- http://secunia.com/advisories/19404
- http://secunia.com/advisories/19407
- http://secunia.com/advisories/19349
- http://secunia.com/advisories/19360
- http://secunia.com/advisories/19361
- http://www.f-secure.com/security/fsc-2006-2.shtml
- ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2006-010.txt.asc
- http://secunia.com/advisories/19394
- http://secunia.com/advisories/19450
- http://secunia.com/advisories/19466
- http://www-1.ibm.com/support/search.wss?rs=0&q=IY82992&apar=only
- http://www-1.ibm.com/support/search.wss?rs=0&q=IY82993&apar=only
- http://www-1.ibm.com/support/search.wss?rs=0&q=IY82994&apar=only
- http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.619600
- ftp://patches.sgi.com/support/free/security/advisories/20060302-01-P
- ftp://patches.sgi.com/support/free/security/advisories/20060401-01-U
- http://secunia.com/advisories/19533
- http://secunia.com/advisories/19532
- http://www.redhat.com/archives/fedora-announce-list/2006-April/msg00018.html
- http://www.redhat.com/archives/fedora-announce-list/2006-April/msg00017.html
- http://www.ciac.org/ciac/bulletins/q-151.shtml
- http://secunia.com/advisories/19345
- http://secunia.com/advisories/19346
- http://secunia.com/advisories/19356
- http://support.avaya.com/elmodocs2/security/ASA-2006-078.htm
- http://secunia.com/advisories/19676
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-102324-1
- http://secunia.com/advisories/19774
- ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.24/SCOSA-2006.24.txt
- http://secunia.com/advisories/20243
- http://www14.software.ibm.com/webapp/set2/sas/f/hmc/power5/install/v52.Readme.html#MH00688
- http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=2751
- http://secunia.com/advisories/20723
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:058
- http://securityreason.com/securityalert/612
- http://securityreason.com/securityalert/743
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-200494-1
- http://www.iss.net/threats/216.html
- http://www.vupen.com/english/advisories/2006/1157
- http://www.vupen.com/english/advisories/2006/1529
- http://www.vupen.com/english/advisories/2006/1051
- http://www.vupen.com/english/advisories/2006/2189
- http://www.vupen.com/english/advisories/2006/1139
- http://itrc.hp.com/service/cki/docDisplay.do?docId=c00692635
- http://www.vupen.com/english/advisories/2006/1072
- http://www.vupen.com/english/advisories/2006/2490
- http://www.vupen.com/english/advisories/2006/1068
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c00629555
- http://www.vupen.com/english/advisories/2006/1049
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24584
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1689
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11074
- http://www.securityfocus.com/archive/1/428656/100/0/threaded