sendmail is vulnerable to authorization bypass. The vulnerability exists as a flaw was found in the way sendmail handled NUL characters in the CommonName field of X.509 certificates. An attacker able to get a carefully-crafted certificate signed by a trusted Certificate Authority could trick sendmail into accepting it by mistake, allowing the attacker to perform a man-in-the-middle attack or bypass intended client certificate authentication.
CPE | Name | Operator | Version |
---|---|---|---|
sendmail | eq | 8.13.1__3.3.el4 | |
sendmail | eq | 8.13.8__2.el5 | |
sendmail | eq | 8.13.1__3.2.el4 | |
sendmail | eq | 8.13.1__3.3.el4 | |
sendmail | eq | 8.13.8__2.el5 | |
sendmail | eq | 8.13.1__3.2.el4 |
lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html
marc.info/?l=bugtraq&m=126953289726317&w=2
secunia.com/advisories/37998
secunia.com/advisories/38314
secunia.com/advisories/38915
secunia.com/advisories/39088
secunia.com/advisories/40109
secunia.com/advisories/43366
security.gentoo.org/glsa/glsa-201206-30.xml
sunsolve.sun.com/search/document.do?assetkey=1-77-1021797.1-1
www.debian.org/security/2010/dsa-1985
www.redhat.com/security/updates/classification/#low
www.redhat.com/support/errata/RHSA-2011-0262.html
www.securityfocus.com/bid/37543
www.sendmail.org/releases/8.14.4
www.vupen.com/english/advisories/2009/3661
www.vupen.com/english/advisories/2010/0719
www.vupen.com/english/advisories/2010/1386
www.vupen.com/english/advisories/2011/0415
access.redhat.com/errata/RHSA-2010:0237
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10255
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11822