CVE-2009-4565
Published: 4 January 2010
sendmail before 8.14.4 does not properly handle a '\0' character in a Common Name (CN) field of an X.509 certificate, which (1) allows man-in-the-middle attackers to spoof arbitrary SSL-based SMTP servers via a crafted server certificate issued by a legitimate Certification Authority, and (2) allows remote attackers to bypass intended access restrictions via a crafted client certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
Notes
Author | Note |
---|---|
mdeslaur | sendmail is in main only for libmilter, all other binary packages are in universe. This flaw affects sendmail packages in universe. |
Priority
Status
Package | Release | Status |
---|---|---|
sendmail Launchpad, Ubuntu, Debian |
dapper |
Ignored
(end of life)
|
hardy |
Ignored
(end of life)
|
|
intrepid |
Ignored
(end of life, was needed)
|
|
jaunty |
Ignored
(end of life)
|
|
karmic |
Ignored
(end of life)
|
|
lucid |
Not vulnerable
(8.14.3-9.1ubuntu1)
|
|
maverick |
Not vulnerable
(8.14.3-9.1ubuntu1)
|
|
natty |
Not vulnerable
(8.14.3-9.1ubuntu1)
|
|
oneiric |
Not vulnerable
(8.14.3-9.1ubuntu1)
|
|
upstream |
Released
(8.14.4)
|
|
Patches: vendor: http://www.mandriva.com/en/security/advisories?name=MDVSA-2010:003 vendor: http://bugs.debian.org/cgi-bin/bugreport.cgi?msg=21;filename=sendmail_8.14.3-9.1.debdiff;att=1;bug=564581 vendor: https://bugzilla.redhat.com/attachment.cgi?id=382283&action=diff |
||
Binaries built from this source package are in Universe and so are supported by the community. |