Sendmail 8.12.7 Vulnerability and Patch


 
Thread Tools Search this Thread
Special Forums Cybersecurity Sendmail 8.12.7 Vulnerability and Patch
# 1  
Old 03-03-2003
Sendmail 8.12.7 Vulnerability and Patch

Quote:
Internet Security Systems Security Advisory

March 3, 2003



Remote Sendmail Header Processing Vulnerability



Synopsis:



ISS X-Force has discovered a buffer overflow vulnerability in the Sendmail

Mail Transfer Agent (MTA). Sendmail is the most common MTA and has been

documented to handle between 50% and 75% of all Internet email traffic.



Impact:



Attackers may remotely exploit this vulnerability to gain "root" or superuser

control of any vulnerable Sendmail server. Sendmail and all other email

servers are typically exposed to the Internet in order to send and receive

Internet email. Vulnerable Sendmail servers will not be protected by legacy

security devices such as firewalls and/or packet filters. This vulnerability

is especially dangerous because the exploit can be delivered within an email

message and the attacker doesn't need any specific knowledge of the target to

launch a successful attack.



Affected Versions:



Sendmail versions from 5.79 to 8.12.7 are vulnerable



Note: The affected versions of Sendmail commercial, Sendmail open source

running on all platforms are known to be vulnerable.



Description:



The Sendmail remote vulnerability occurs when processing and evaluating

header fields in email collected during an SMTP transaction. Specifically,

when fields are encountered that contain addresses or lists of addresses

(such as the "From" field, "To" field and "CC" field), Sendmail attempts

to semantically evaluate whether the supplied address (or list of addresses)

are valid. This is accomplished using the crackaddr() function, which is

located in the headers.c file in the Sendmail source tree.



A static buffer is used to store data that has been processed. Sendmail

detects when this buffer becomes full and stops adding characters, although

it continues processing. Sendmail implements several security checks to

ensure that characters are parsed correctly. One such security check is

flawed, making it possible for a remote attacker to send an email with a

specially crafted address field that triggers a buffer overflow.



X-Force has demonstrated that this vulnerability is exploitable in real-

world conditions on production Sendmail installations. This vulnerability is

readily exploitable on x86 architecture systems, and may be exploitable on

others as well.



Protection mechanisms such as implementation of a non-executable stack do not

offer any protection from exploitation of this vulnerability. Successful

exploitation of this vulnerability does not generate any log entries.



Recommendations:



For identification of potentially vulnerable systems, Internet Security

Systems has provided the following assessment checks:



Internet Scanner XPU 6.24

MtaDiscovery - (<http://www.iss.net/security_center/static/10961.php>)



Internet Scanner XPU 6.26

SendmailRunning - (<http://www.iss.net/security_center/static/2938.php>)



System Scanner SR 3.13

sendmail-header-processing-bo -

(<http://www.iss.net/security_center/static/10748.php>)



For Dynamic Threat Protection, Internet Security Systems recommends applying a

Virtual Patch for the Sendmail vulnerability. Employ the following protection

techniques through ISS' Dynamic Threat Protection platform.



RealSecure Network Sensor XPU 20.9 and 5.8:

SMTP_Sendmail_Header_Parse_Overflow -

(http://www.iss.net/security_center/static/10748.php)



All updates listed above are available from the ISS Download center

(http://www.iss.net/download)



For Manual Protection, the affected vendor has offered the following

recommendations:



Sendmail urges all users to either upgrade to Sendmail 8.12.8 or apply a patch

for 8.12.x (or for older versions). Updates can be downloaded from

ftp.sendmail.org or any of its mirrors (try a mirror near to you first), see

http://www.sendmail.org/ for details. Remember to check the PGP signatures of

patches or releases obtained. For those not running the open source version,

check with your vendor for a patch. Sendmail, Inc., the commercial provider of

the sendmail MTA, is providing a binary patch for their commercial customers.

The patch can be downloaded from Sendmail's Web site at:

http://www.sendmail.com/



Sendmail versions that are patched will record the following log entry when

exploitation is attempted: "Dropped invalid comments from header address".



Vendor Notification Schedule:



Initial vendor notification: 1/13/2003

Initial vendor confirmation: 1/13/2003

Final release schedule confirmation: 1/31/2003



ISS X-Force worked with Sendmail throughout the notification and release

process. X-Force would like to thank Sendmail for their cooperation as well as

the National Infrastructure Protection Center (NIPC) for coordinating this

issue with elements of National critical infrastructure.



Additional Information:



The Common Vulnerabilities and Exposures (CVE) project has assigned the name

CAN-2002-1337 to this issue. This is a candidate for inclusion in the CVE

list http://cve.mitre.org), which standardizes names for security problems.



If you are a RealSecure Server Sensor customer, please email Support@iss.net

for additional protection information. Please enter the words "Server

Sensor - Sendmail" in the subject line of your email.



X-Force Database

http://www.iss.net/security_center/static/10748.php



For more information on ISS methodology and procedures involved in Security

Advisory publication, please review the X-Force Vulnerability Disclosure

Guidelines document:

http://documents.iss.net/literature/...guidelines.pdf



Credit:



This vulnerability was discovered and researched by Mark Dowd of the ISS

X-Force.
Login or Register to Ask a Question

Previous Thread | Next Thread

9 More Discussions You Might Find Interesting

1. Solaris

Clarifying sendmail configuration - sendmail-client offline

Hi all, I have read about sendmail running as 2 separate process. 1 as a MSP, and the other as the real daemon or MTA. In my current configuration, the sendmail-client is disabled. Both submit.cf and sendmail.cf are left as default untouch I do not specified any mailhost... (3 Replies)
Discussion started by: javanoob
3 Replies

2. UNIX for Advanced & Expert Users

Sendmail questions, SCO 5.0.6 sendmail 8.11.0

I am running SCO 5.0.6 and using sendmail 8.11.0 and having issues with smtp authentication. When trying to send mail the following message will kick back. (reason: 530 5.7.1 Authentication required) 530 5.7.1 Authentication required Not sure what needs to be tweeked in sendmail.cf but I... (1 Reply)
Discussion started by: ziggy6
1 Replies

3. HP-UX

Patch Management

HI all, As per the audit policy, patch has to be apply periodically, but in my scenerio, it has been applied lastly in the year 2010. Using HP UX 11.11, 11.21 and 11.31 I would like to know, how to identify the patches which are need to update, what will be the procedure to update, how to... (5 Replies)
Discussion started by: selvaforum
5 Replies

4. Solaris

sendmail failed after patch update

Hi, I was troubleshooting H/W issue on a Ultra 5 workstation, whereby the system kept rebooting. In the course of isolating the issue, I patched the system with the latest Recommended cluster patch for solaris 7. SInce then, sendmail is not working and am getting the following errors. Kindly check... (6 Replies)
Discussion started by: incredible
6 Replies

5. Solaris

Patch help?

Hello... I'm looking for latest patch for automount and what it does on Solaris8, Thanks! :confused: (2 Replies)
Discussion started by: catwomen
2 Replies

6. IP Networking

Patch-o-matic (patch for iptable) for linux2.4.08 & iptable1.2.7a

Hello friends I'm running Redhat 9.0 with linux kernel 2.4.20-8 & have iptables version 1.2.7a & encountering a problem that I narrate down. I need to apply patch to my iptable and netfilter for connection tracking and load balancing that are available in patch-o-matic distribution by netfilter.... (0 Replies)
Discussion started by: Rakesh Ranjan
0 Replies

7. UNIX for Dummies Questions & Answers

patch

Dear All , I have Sun Solaries 7 sparc server ... am runing perl , CGI , MD5 ... etc for new web mail am setting up . now i have to install the patch ( xyz.pl.patch ) against a perl file for ex. xxx.pl what exact command i have to use ,,, also i do not want to make damage for my system... (6 Replies)
Discussion started by: tamemi
6 Replies

8. Shell Programming and Scripting

patch

Dear Guys , I use Linux Red Hat 9 .. i installed a patch for a web mail i use , and i think it make a damage for my web mail i cannot see it anymore . i get so many error messages . what i want to ask is there any command on linux i can use to remove the patch !!! i want to remove the... (1 Reply)
Discussion started by: tamemi
1 Replies

9. HP-UX

OS Patch

Hello, I have to apply the patch PHSS_24302 on HPUX B.11.11 os version. When i look at the /var/adm/sw/swagentd.log it mentions that "this is not a valid depot". I downloaded the patch from HP web site. Please get back to me at the earliest as I'm dead in the water. Thanks, Balaji K (3 Replies)
Discussion started by: bkrish
3 Replies
Login or Register to Ask a Question