Summary: | <mail-mta/sendmail-8.14.4: X.509 NULL spoofing (CVE-2009-4565) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Alex Legler (RETIRED) <a3li> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | net-mail+disabled, tb |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.sendmail.org/releases/8.14.4 | ||
Whiteboard: | A3 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Alex Legler (RETIRED)
![]() ![]() ![]() net-mail, we have 8.14.4 is in tree, is it ok to stabilize? CVE-2009-4565 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4565): sendmail before 8.14.4 does not properly handle a '\0' character in a Common Name (CN) field of an X.509 certificate, which (1) allows man-in-the-middle attackers to spoof arbitrary SSL-based SMTP servers via a crafted server certificate issued by a legitimate Certification Authority, and (2) allows remote attackers to bypass intended access restrictions via a crafted client certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408. I take that as a "yes". Arches, please test and mark stable: =mail-mta/sendmail-8.14.4 Target keywords : "alpha amd64 arm hppa ia64 ppc ppc64 s390 sh sparc x86" x86 stable ppc and ppc64 done Stable for HPPA. alpha/arm/ia64/s390/sh/sparc stable amd64 stable, all arches done. GLSA request filed. This issue was resolved and addressed in GLSA 201206-30 at http://security.gentoo.org/glsa/glsa-201206-30.xml by GLSA coordinator Stefan Behte (craig). |