Upstream information

CVE-2006-4434 at MITRE

Description

Use-after-free vulnerability in Sendmail before 8.13.8 allows remote attackers to cause a denial of service (crash) via a long "header line", which causes a previously freed variable to be referenced. NOTE: the original developer has disputed the severity of this issue, saying "The only denial of service that is possible here is to fill up the disk with core dumps if the OS actually generates different core dumps (which is unlikely)... the bug is in the shutdown code (finis()) which leads directly to exit(3), i.e., the process would terminate anyway, no mail delivery or receiption is affected."

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 5
Vector AV:N/AC:L/Au:N/C:N/I:N/A:P
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial
SUSE Bugzilla entry: 202370 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE LINUX Retail Solution 8
SuSE Linux Enterprise Server 8 for AMD64
SuSE Linux Enterprise Server 8 for IBM iSeries and IBM pSeries
SuSE Linux Enterprise Server 8 for IBM zSeries
SuSE Linux Enterprise Server 8 for IPF
SuSE Linux Openexchange Server 4
SuSE Linux School Server for i386
SuSE Linux Standard Server 8
UnitedLinux 1.0
  • sendmail >= 8.12.6-215
sles10.s390x
sled10.x86
core9.x86
slrs8.x86
ul1.s390
core9.s390
ZYPP Patch Nr: 2030
Open Enterprise Server
  • sendmail >= 8.12.11-2.10
sles10.s390x
sled10.x86
core9.x86
slrs8.x86
ul1.s390
core9.s390
ZYPP Patch Nr: 2030
SUSE LINUX 10.0
  • sendmail >= 8.13.4-8.8
SUSE LINUX 10.1
  • sendmail >= 8.13.6-9.9
SUSE LINUX 9.2
  • sendmail >= 8.13.1-5.8
SUSE LINUX 9.3
  • sendmail >= 8.13.3-5.8