-----BEGIN PGP SIGNED MESSAGE----- ______________________________________________________________________________ Caldera Systems, Inc. Security Advisory Subject: DoS attack on sendmail Advisory number: CSSA-1999:002.0 Issue date: 1999 Jan 29 Cross reference: ______________________________________________________________________________ 1. Problem Description Sendmail servers that pause for five second after accept() returns an error can be stopped if a peer resets the connection. 2. Vulnerable Versions Systems: OpenLinux 1.0, 1.1, 1.2, 1.3. Packages: <= sendmail-8.8.7-4.i386.rpm 3. Solutions The proper solution is to upgrade to the senmail-8.8.7-6 packages. 4. Location of Fixed Packages The upgrade packages can be found on Caldera's FTP site at: ftp://ftp.caldera.com/pub/OpenLinux/updates/1.3/019/RPMS/ The corresponding source code package can be found at: ftp://ftp.caldera.com/pub/OpenLinux/updates/1.3/019/SRPMS 5. Installing Fixed Packages Upgrade the affected packages with the following commands: rpm -q sendmail-doc && rpm -U sendmail-doc-8.8.7-6.i386.rpm rpm -q sendmail-cf && rpm -U sendmail-cf-8.8.7-6.i386.rpm rpm -q sendmail && rpm -U sendmail-8.8.7-6.i386.rpm 6. Verification The MD5 checksums (from the "md5sum" command) for these packages are: 87d4fa72995de73e866c37eba998a378 RPMS/sendmail-8.8.7-6.i386.rpm 45b0ad87a639d20cee0c637ebaa2ee88 RPMS/sendmail-doc-8.8.7-6.i386.rpm ea2242e8dc1a5c8f0c0f219ce269a356 SRPMS/sendmail-8.8.7-6.src.rpm 7. References This and other Caldera security resources are located at: http://www.calderasystems.com/news/security/index.html Additional documentation on this problem can be found in: This security fix closes Caldera's internal Problem Report 4187. 8. Disclaimer Caldera Systems, Inc. is not responsible for the misuse of any of the information we provide on this website and/or through our security advisories. Our advisories are a service to our customers intended to promote secure installation and use of Caldera OpenLinux. ______________________________________________________________________________ -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv iQCVAwUBNsQDgOn+9R4958LpAQGxIwP/d9WZqC/ECbfJ5dyk1jOwUpe4ymjhs+qV tB9iqH+G0V7afpXlX32vG9DbF5LQzDocwTTjLzWgy7b2AyteY2ak3o7raJbPzxcN G7JiYzgGzE0rAC3INsWFS+zdW3VbkZ93Q+80y9FRZGzDNOx3/5DUQnAAFgLXUAoE /aHjM+zueCw= =T9hK -----END PGP SIGNATURE-----