RE: [suse-security] SuSE Security Announcement: sendmail (SuSE-SA:2003:013)

"A patched sendmail server will drop invalid headers, thus preventing downstream servers from receiving them." A non-sendmail relay will not be affected by the problem but will pass on messages containing the headers and that may affect downstream sendmail servers. -----Original Message----- From: Ulrich Roth [mailto:Roth@impact.de] Sent: Tue 3/4/2003 2:25 PM To: suse-security@suse.com Cc: Subject: AW: [suse-security] SuSE Security Announcement: sendmail (SuSE-SA:2003:013) Hi Martin,
Yes, the bad headers are passed on. Quote from the announcement: The vulnerability is triggered by an email message sent through the sendmail MTA subsystem. In that respect, it is different from commonly known bugs that occur in the context of an open TCP connection. By consequence, the vulnerability also exists if email messages get forwarded over a relay that itself does not run a vulnerable MTA. This specific detail and the wide distribution of sendmail in the internet causes this vulnerability to be considered an error of major severity. Bye Uli -- Ulrich Roth IMPACT Business & Technology Consulting GmbH Im Mediapark 8 / KölnTurm D-50670 Koeln Phone +49-221-93 70 80-29 Fax +49-221-93 70 80-15 E-Mail: roth@impact.de -- Check the headers for your unsubscription address For additional commands, e-mail: suse-security-help@suse.com Security-related bug reports go to security@suse.de, not here
participants (1)
-
Hemsley, Trevor