Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA485] DSA-485-1 ssmtp


Vulnerability Assessment Details

[DSA485] DSA-485-1 ssmtp

Vulnerability Assessment Summary
DSA-485-1 ssmtp

Detailed Explanation for this Vulnerability Assessment

Max Vozeler discovered two format string vulnerabilities in ssmtp, a
simple mail transport agent. Untrusted values in the functions die()
and log_event() were passed to printf-like functions as format
strings. These vulnerabilities could potentially be exploited by a
remote mail relay to gain the rights of the ssmtp process
(including potentially root).
For the current stable distribution (woody) this problem will be fixed
in version 2.50.6.1.
For the unstable distribution (sid), this problem will be fixed soon.
We recommend that you update your ssmtp package.


Solution : http://www.debian.org/security/2004/dsa-485
Network Security Threat Level: High

Networks Security ID: 10150

Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi

Cables, Connectors

Lot of 2 NEW Linksys Skype CIT200 VoIP Cordless Internet Telephony Kit
$30.0
Lot of 2 NEW Linksys Skype CIT200 VoIP Cordless Internet Telephony Kit pictureNEW SEALED MagicJack GO VoIP Adapter 12 Months of Service Never Activated K1103
$34.99
NEW SEALED MagicJack GO VoIP Adapter 12 Months of Service Never Activated K1103 pictureCisco CP 6921 2 Line Office VoIP Phone CP 6921 C K9
$66.99
Cisco CP 6921  2 Line Office VoIP Phone CP 6921 C K9 pictureCisco 7960 Series VOIP PoE Telephone
$5.99
Cisco 7960 Series VOIP PoE Telephone picture


Discussions

No Discussions have been posted on this vulnerability.