Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA1155] DSA-1155-2 sendmail

Vulnerability Assessment Details

[DSA1155] DSA-1155-2 sendmail

Vulnerability Assessment Summary
DSA-1155-2 sendmail

Detailed Explanation for this Vulnerability Assessment

It turned out that the sendmail binary depends on libsasl2 (>= 2.1.19.dfsg1)
which is neither available in the stable nor in the security archive.
This version is scheduled for the inclusion in the next update of the
stable release, though.
You'll have to download the referenced file for your architecture from
below and install it with dpkg -i.
As an alternative, temporarily adding the following line to
/etc/apt/sources.list will mitigate the problem as well:
Here is the original security advisory for completeness:
Frank Sheiness discovered that a MIME conversion routine in sendmail,
a powerful, efficient, and scalable mail transport agent, could be
tricked by a specially crafted mail to perform an endless recursion.
For the stable distribution (sarge) this problem has been fixed in
version 8.13.4-3sarge2.
For the unstable distribution (sid) this problem has been fixed in
version 8.13.7-1.
We recommend that you upgrade your sendmail package.

Solution :
Network Security Threat Level: High

Networks Security ID: 18433

Vulnerability Assessment Copyright: This script is (C) 2007 Michel Arboi

Cables, Connectors

IBM 5723-701X 2-PORT ASYNC EIA-232 PCI ADAT pictureIBM ThinkVision 6734-AB0 17" TFT LCD Monitor L170
IBM ThinkVision 6734-AB0 17IBM 39J5770 5751 4.7GB IDE DVD/CD-RW
IBM 39J5770 5751 4.7GB IDE DVD/CD-RW picture


No Discussions have been posted on this vulnerability.