Martinez, Mike (MHS-ACS)
2003-Mar-04 06:50 UTC
[Shorewall-users] Remote Buffer Overflow in Sendmail
FYI Sendmail has a serious vulnerability. To read about this vulnerability click on this link..... http://www.cert.org/advisories/CA-2003-07.html Extract from part of this advisory...... CERT? Advisory CA-2003-07 Remote Buffer Overflow in Sendmail Original release date: March 3, 2003 Last revised: March 4, 2003 Source: CERT/CC A complete revision history can be found at the end of this file. Systems Affected Sendmail Pro (all versions) Sendmail Switch 2.1 prior to 2.1.5 Sendmail Switch 2.2 prior to 2.2.5 Sendmail Switch 3.0 prior to 3.0.3 Sendmail for NT 2.X prior to 2.6.2 Sendmail for NT 3.0 prior to 3.0.3 Systems running open-source sendmail versions prior to 8.12.8, including UNIX and Linux systems Overview There is a vulnerability in sendmail that may allow remote attackers to gain the privileges of the sendmail daemon, typically root. I. Description Researchers at Internet Security Systems (ISS) have discovered a remotely exploitable vulnerability in sendmail. This vulnerability could allow an intruder to gain control of a vulnerable sendmail server. Most organizations have a variety of mail transfer agents (MTAs) at various locations within their network, with at least one exposed to the Internet. Since sendmail is the most popular MTA, most medium-sized to large organizations are likely to have at least one vulnerable sendmail server. In addition, many UNIX and Linux workstations provide a sendmail implementation that is enabled and running by default. This vulnerability is message-oriented as opposed to connection-oriented. That means that the vulnerability is triggered by the contents of a specially-crafted email message rather than by lower-level network traffic. This is important because an MTA that does not contain the vulnerability will pass the malicious message along to other MTAs that may be protected at the network level. In other words, vulnerable sendmail servers on the interior of a network are still at risk, even if the site''s border MTA uses software other than sendmail. Also, messages capable of exploiting this vulnerability may pass undetected through many common packet filters or firewalls. Mike
On Tue, 2003-03-04 at 15:50, Martinez, Mike (MHS-ACS) wrote:> Sendmail has a serious vulnerability. To read about this vulnerability click > on this link.....Maybe it''s not my place to say anything as I haven''t been on this list for too long. But I''d prefer not to hear about stuff like this from yet another source. Everybody who''s even slightly interested in the topic should have heard about this by now from sources ranging from Bugtraq to CNN. No reason to clutter specific purpose mailing lists with it, too. Just my 2c. Oliver Sturm -- Dahlhoff IT-Solutions - Buellenkothenweg 37a - 40229 Duesseldorf Tel.: 0211-22959012 - Fax: 0211-22959016 - http://www.dahlhoff.biz Jabber sturm@amessage.de ICQ 27142619 MSN macnapple@hotmail.com Y! macnapple -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 225 bytes Desc: This is a digitally signed message part Url : http://lists.shorewall.net/pipermail/shorewall-users/attachments/20030304/e9d161d0/attachment.bin
--On Tuesday, March 04, 2003 03:57:13 PM +0100 Oliver Sturm <o.sturm@manfred-dahlhoff.de> wrote:> No reason to clutter specific purpose mailing lists with it, too.We''re usually pretty tolerant of off-topic posts provided that they are security-related and are likely to be relevant to the list membership. -Tom -- Tom Eastep \ Shorewall - iptables made easy Shoreline, \ http://www.shorewall.net Washington USA \ teastep@shorewall.net