Updated ssmtp package fixes security vulnerability
Publication date: 09 Oct 2013Modification date: 09 Oct 2013
Type: security
Affected Mageia releases : 2 , 3
Description
It was reported that ssmtp, an extremely simple MTA to get mail off the system to a mail hub, did not perform x509 certificate validation when initiating a TLS connection to server. A rogue server could use this flaw to conduct man-in- the-middle attack, possibly leading to user credentials leak. As a result, alterations may be required to the configuration if using TLS. The default ssmtp.conf now contains the lines below to load root certificates which should be created as ssmtp.conf.rpmnew if it has been altered. #IMPORTANT: Uncomment the following line if you use TLS authentication #TLS_CA_File=/etc/pki/tls/certs/ca-bundle.crt
References
SRPMS
2/core
- ssmtp-2.64-5.3.mga2
3/core
- ssmtp-2.64-8.3.mga3