Advisories ยป MGASA-2013-0296

Updated ssmtp package fixes security vulnerability

Publication date: 09 Oct 2013
Modification date: 09 Oct 2013
Type: security
Affected Mageia releases : 2 , 3

Description

It was reported that ssmtp, an extremely simple MTA to get mail off the system
to a mail hub, did not perform x509 certificate validation when initiating a
TLS connection to server. A rogue server could use this flaw to conduct man-in-
the-middle attack, possibly leading to user credentials leak.

As a result, alterations may be required to the configuration if using TLS.
The default ssmtp.conf now contains the lines below to load root certificates
which should be created as ssmtp.conf.rpmnew if it has been altered.

#IMPORTANT: Uncomment the following line if you use TLS authentication
#TLS_CA_File=/etc/pki/tls/certs/ca-bundle.crt
                

References

SRPMS

2/core

3/core