exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

CA-2003-07.sendmail

CA-2003-07.sendmail
Posted Mar 4, 2003
Site cert.org

CERT Advisory CA-2003-07 - Sendmail prior to 8.12.8 has a remote root vulnerability which can be exploited by a malicious mail message, allowing non-vulnerable MTA's to relay the exploit message to unpatched MTA's on an internal network. A successful attack against an unpatched sendmail system will not leave any messages in the logs. All Sendmail Pro, Sendmail Switch, and Sendmail for NT are also vulnerable. Fix available here.

tags | remote, root
advisories | CVE-2002-1337
SHA-256 | e30f99a4f1539fc802ae45ac228a34841e7a4bb0387c42032299a105f9418235

CA-2003-07.sendmail

Change Mirror Download


-----BEGIN PGP SIGNED MESSAGE-----

CERT Advisory CA-2003-07 Remote Buffer Overflow in Sendmail

Original release date: March 3, 2003
Last revised: --
Source: CERT/CC

A complete revision history can be found at the end of this file.

Systems Affected

* Sendmail Pro (all versions)
* Sendmail Switch 2.1 prior to 2.1.5
* Sendmail Switch 2.2 prior to 2.2.5
* Sendmail Switch 3.0 prior to 3.0.3
* Sendmail for NT 2.X prior to 2.6.2
* Sendmail for NT 3.0 prior to 3.0.3
* Systems running open-source sendmail versions prior to 8.12.8,
including UNIX and Linux systems

Overview

There is a vulnerability in sendmail that may allow remote attackers
to gain the privileges of the sendmail daemon, typically root.

I. Description

Researchers at Internet Security Systems (ISS) have discovered a
remotely exploitable vulnerability in sendmail. This vulnerability
could allow an intruder to gain control of a vulnerable sendmail
server.

Most organizations have a variety of mail transfer agents (MTAs) at
various locations within their network, with at least one exposed to
the Internet. Since sendmail is the most popular MTA, most
medium-sized to large organizations are likely to have at least one
vulnerable sendmail server. In addition, many UNIX and Linux
workstations provide a sendmail implementation that is enabled and
running by default.

This vulnerability is message-oriented as opposed to
connection-oriented. That means that the vulnerability is triggered by
the contents of a specially-crafted email message rather than by
lower-level network traffic. This is important because an MTA that
does not contain the vulnerability will pass the malicious message
along to other MTAs that may be protected at the network level. In
other words, vulnerable sendmail servers on the interior of a network
are still at risk, even if the site's border MTA uses software other
than sendmail. Also, messages capable of exploiting this vulnerability
may pass undetected through many common packet filters or firewalls.

Sendmail has indicated to the CERT/CC that this vulnerability has been
successfully exploited in a laboratory environment. We do not believe
that this exploit is available to the public. However, this
vulnerability is likely to draw significant attention from the
intruder community, so the probability of a public exploit is high.

A successful attack against an unpatched sendmail system will not
leave any messages in the system log. However, on a patched system, an
attempt to exploit this vulnerability will leave the following log
message:

Dropped invalid comments from header address

Although this does not represent conclusive evidence of an attack, it
may be useful as an indicator.

A patched sendmail server will drop invalid headers, thus preventing
downstream servers from receiving them.

The CERT/CC is tracking this issue as VU#398025. This reference number
corresponds to CVE candidate CAN-2002-1337.

For more information, please see

https://www.sendmail.org
https://www.sendmail.org/8.12.8.html
https://www.sendmail.com/security/
https://www.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21950
https://www.kb.cert.org/vuls/id/398025

II. Impact

Successful exploitation of this vulnerability may allow an attacker to
gain the privileges of the sendmail daemon, typically root. Even
vulnerable sendmail servers on the interior of a given network may be
at risk since the vulnerability is triggered from the contents of a
malicious email message.

III. Solution

Apply a patch from Sendmail

Sendmail has produced patches for versions 8.9, 8.10, 8.11, and 8.12.
However, the vulnerability also exists in earlier versions of the
code; therefore, site administrators using an earlier version are
encouraged to upgrade to 8.12.8. These patches are located at

ftp://ftp.sendmail.org/pub/sendmail/sendmail.8.12.security.cr.patch
ftp://ftp.sendmail.org/pub/sendmail/sendmail.8.11.6.security.cr.patch
ftp://ftp.sendmail.org/pub/sendmail/sendmail.8.9.3.security.cr.patch

Apply a patch from your vendor

Many vendors include vulnerable sendmail servers as part of their
software distributions. We have notified vendors of this vulnerability
and recorded their responses in the systems affected section of
VU#398025. Several vendors have provided a statement for direct
inclusion in this advisory; these statements are available in Appendix
A.

Enable the RunAsUser option

There is no known workaround for this vulnerability. Until a patch can
be applied, you may wish to set the RunAsUser option to reduce the
impact of this vulnerability. As a good general practice, the CERT/CC
recommends limiting the privileges of an application or service
whenever possible.

Appendix A. - Vendor Information

This appendix contains information provided by vendors for this
advisory. As vendors report new information to the CERT/CC, we will
update this section and note the changes in our revision history. If a
particular vendor is not listed below, we have not received their
comments.

Apple Computer, Inc.

Security Update 2003-03-03 is available to fix this issue. Packages
are available for Mac OS X 10.1.5 and Mac OS X 10.2.4. It should be
noted that sendmail is not enabled by default on Mac OS X, so only
those systems which have explicitly enabled it are susceptible to the
vulnerability. All customers of Mac OS X, however, are encouraged to
apply this update to their systems.

Avaya, Inc.

Avaya is aware of the vulnerability and is investigating impact. As
new information is available this statement will be updated.

BSD/OS

Wind River Systems has created patches for this problem which are
available from the normal locations for each release. The relevant
patches are M500-006 for BSD/OS version 5.0 or the Wind River Platform
for Server Appliances 1.0, M431-002 for BSD/OS 4.3.1, or M420-032 for
BSD/OS 4.2 systems.

Cisco Systems

Cisco is investigating this issue. If we determine any of our products
are vulnerable that information will be available at:
https://www.cisco.com/go/psirt

Cray Inc.

The code supplied by Cray, Inc. in Unicos, Unicos/mk, and Unicos/mp
may be vulnerable. Cray has opened SPRs 724749 and 724750 to
investigate.

Cray, Inc. is not vulnerable for the MTA systems.

Hewlett-Packard Company

SOURCE:
Hewlett-Packard Company
HP Services
Software Security Response Team

x-ref: SSRT3469 sendmail

HP will provide notice of the availability of patches through standard
security bulletin announcements and be available from your normal HP
Services support channel.

IBM Corporation

The AIX operating system is vulnerable to the sendmail issues
discussed in releases 4.3.3, 5.1.0 and 5.2.0.

A temporary patch is available through an efix package which can be
found at
ftp://ftp.software.ibm.com/aix/efixes/security/sendmail_efix.tar.Z

IBM will provide the following official fixes:

APAR number for AIX 4.3.3: IY40500 (available approx.
03/12/2003)
APAR number for AIX 5.1.0: IY40501 (available approx.
04/28/2003)
APAR number for AIX 5.2.0: IY40502 (available approx.
04/28/2003)

Openwall GNU/*/Linux

Openwall GNU/*/Linux is not vulnerable. We use Postfix as the MTA, not
sendmail.

Red Hat Inc.

Updated sendmail packages that are not vulnerable to this issue are
available for Red Hat Linux, Red Hat Advanced Server, and Red Hat
Advanced Workstation. Red Hat Network users can update their systems
using the 'up2date' tool.

Red Hat Linux:

https://rhn.redhat.com/errata/RHSA-2003-073.html

Red Hat Linux Advanced Server, Advanced Workstation:

https://rhn.redhat.com/errata/RHSA-2003-074.html

SGI

SGI acknowledges VU#398025 reported by CERT and has released an
advisory to address the vulnerability on IRIX.

Refer to SGI Security Advisory 20030301-01-P available from
ftp://patches.sgi.com/support/free/security/advisories/20030301-01-P
or https://www.sgi.com/support/security/.

The Sendmail Consortium

The Sendmail Consortium suggests that sites upgrade to 8.12.8 if
possible. Alternatively, patches are available for 8.9, 8.10, 8.11,
and 8.12 on https://www.sendmail.org/

Sendmail, Inc.

All commercial releases including Sendmail Switch, Sendmail Advanced
Message Server (which includes the Sendmail Switch MTA), Sendmail for
NT, and Sendmail Pro are affected by this issue. Patch information is
available at https://www.sendmail.com/security.
_________________________________________________________________

Our thanks to Internet Security Systems, Inc. for discovering this
problem, and to Eric Allman, Claus Assmann, and Greg Shapiro of
Sendmail for notifying us of this problem. We thank both groups for
their assistance in coordinating the response to this problem.
_________________________________________________________________

Authors: Jeffrey P. Lanza and Shawn V. Hernan
______________________________________________________________________

This document is available from:
https://www.cert.org/advisories/CA-2003-07.html
______________________________________________________________________

CERT/CC Contact Information

Email: cert@cert.org
Phone: +1 412-268-7090 (24-hour hotline)
Fax: +1 412-268-6989
Postal address:
CERT Coordination Center
Software Engineering Institute
Carnegie Mellon University
Pittsburgh PA 15213-3890
U.S.A.

CERT/CC personnel answer the hotline 08:00-17:00 EST(GMT-5) /
EDT(GMT-4) Monday through Friday; they are on call for emergencies
during other hours, on U.S. holidays, and on weekends.

Using encryption

We strongly urge you to encrypt sensitive information sent by email.
Our public PGP key is available from
https://www.cert.org/CERT_PGP.key

If you prefer to use DES, please call the CERT hotline for more
information.

Getting security information

CERT publications and other security information are available from
our web site
https://www.cert.org/

To subscribe to the CERT mailing list for advisories and bulletins,
send email to majordomo@cert.org. Please include in the body of your
message

subscribe cert-advisory

* "CERT" and "CERT Coordination Center" are registered in the U.S.
Patent and Trademark Office.
______________________________________________________________________

NO WARRANTY
Any material furnished by Carnegie Mellon University and the Software
Engineering Institute is furnished on an "as is" basis. Carnegie
Mellon University makes no warranties of any kind, either expressed or
implied as to any matter including, but not limited to, warranty of
fitness for a particular purpose or merchantability, exclusivity or
results obtained from use of the material. Carnegie Mellon University
does not make any warranty of any kind with respect to freedom from
patent, trademark, or copyright infringement.
_________________________________________________________________

Conditions for use, disclaimers, and sponsorship information

Copyright 2003 Carnegie Mellon University.

Revision History
Mar 03, 2003: Initial release

-----BEGIN PGP SIGNATURE-----
Version: PGP 6.5.8

iQCVAwUBPmOZEWjtSoHZUTs5AQGNUwP/YC0aRMqrFoLxUjG9pZIOBb98z8BFPfTW
w/5u09rcW7WpH52XGaOWbu9PYtnLKtPaMrwevc38r6ILvZywasxdpUcUtR4W9XPZ
9EW4LYB1EaU81PLpzkQXWkVAhlX4vgHTU75oEcjfsacxXHlxtMYM1JpmyO8gvlnl
pD4vLdvJqHE=
=PfHu
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    17 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close