CERTA-2004-AVI-328
Vulnerability from certfr_avis - Published: 2004-09-29 - Updated: 2004-09-29None
Description
SASL (Simple Authentication and Security Layer) est un mécanisme permettant d'ajouter des fonctionnalités d'authentification à des protocoles réseau.
L'installation du packetage sasl-bin, pour intégrer SASL dans le
serveur de messagerie sendmail, emploie un compte possèdant un mot de
passe par défaut. Cette vulnérabilité peut permettre à un utilisateur
mal intentionné d'employer le serveur de messagerie comme relais ouvert
afin d'envoyer des méls non sollicités.
Solution
Appliquer le correctif fourni par l'éditeur (cf. Documentation).
NoneImpacted products
References
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Les versions de sendmail ant\u00e9rieures \u00e0 8.12.3-.71 avec la distribution Debian stable (woody) ;",
"product": {
"name": "sendmail",
"vendor": {
"name": "Sendmail",
"scada": false
}
}
},
{
"description": "les versions de sendmail ant\u00e9rieures \u00e0 8.13.1-.13 avec la distribution Debian unstable (sid).",
"product": {
"name": "sendmail",
"vendor": {
"name": "Sendmail",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nSASL (Simple Authentication and Security Layer) est un m\u00e9canisme\npermettant d\u0027ajouter des fonctionnalit\u00e9s d\u0027authentification \u00e0 des\nprotocoles r\u00e9seau.\n\nL\u0027installation du packetage `sasl-bin`, pour int\u00e9grer SASL dans le\nserveur de messagerie sendmail, emploie un compte poss\u00e8dant un mot de\npasse par d\u00e9faut. Cette vuln\u00e9rabilit\u00e9 peut permettre \u00e0 un utilisateur\nmal intentionn\u00e9 d\u0027employer le serveur de messagerie comme relais ouvert\nafin d\u0027envoyer des m\u00e9ls non sollicit\u00e9s.\n\n## Solution\n\nAppliquer le correctif fourni par l\u0027\u00e9diteur (cf. Documentation).\n",
"cves": [],
"initial_release_date": "2004-09-29T00:00:00",
"last_revision_date": "2004-09-29T00:00:00",
"links": [],
"reference": "CERTA-2004-AVI-328",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2004-09-29T00:00:00.000000"
}
],
"risks": [
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": null,
"title": "Vuln\u00e9rabilit\u00e9 dans Sendmail avec SASL",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 DSA-554-1 de Debian",
"url": "http://www.debian.org/security/2004/dsa-554"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…