Siapa tahu ada yang belum tahu.

CERT Advisory CA-2003-25 Buffer Overflow in Sendmail

  Original issue date: September 18, 2003
  Last revised: --
  Source: CERT/CC

Systems Affected

    * Systems  running  open-source  sendmail versions prior to 8.12.10,
      including UNIX and Linux systems

    * Commercial   releases   of  sendmail  including  Sendmail  Switch,
      Sendmail Advanced Message Server (SAMS), and Sendmail for NT


Overview


  A  vulnerability  in sendmail could allow a remote attacker to execute
  arbitrary  code  with the privileges of the sendmail daemon, typically
  root.

Impact

  Depending  on  platform  and  operating  system architecture, a remote
  attacker  could  execute  arbitrary  code  with  the privileges of the
  sendmail   daemon.  Unless  the  RunAsUser  option  is  set,  Sendmail
  typically runs as root.


Solution


Upgrade or apply a patch

  This  vulnerability is resolved in Sendmail 8.12.10. Sendmail has also
  released a patch that can be applied to Sendmail 8.9.x through 8.12.9.
  Information  about specific vendors is available in Appendix A. and in
  the Systems Affected section of VU#784980.

  Sendmail  8.12.10  is  designed to correct malformed messages that are
  transferred  by  the server. This should help protect other vulnerable
  sendmail servers.

Enable the RunAsUser option

  While  there  is  no  known  complete workaround, consider setting the
  RunAsUser  option  to  reduce  the impact of this vulnerability. It is
  typically  considered  to  be  a  good  security practice to limit the
  privileges of applications and services whenever possible.


References


* CERT/CC Vulnerability Note VU#784980 -
<http://www.kb.cert.org/vuls/id/784980>
* Michal Zalewski's post to BugTraq -
<http://www.securityfocus.com/archive/1/337839>
* Sendmail 8.12.10 - <http://www.sendmail.org/8.12.10.html>
* Sendmail patch for 8.12.9 -
<http://www.sendmail.org/patches/parse8.359.2.8>
* Sendmail 8.12.10 announcement -
<http://archives.neohapsis.com/archives/sendmail/2003-q3/0002.html
>
* Sendmail Secure Install -
<http://www.sendmail.org/secure-install.html>
_________________________________________________________________


  This  vulnerability was discovered by Michal Zalewski. Thanks to Claus
  Assmann  and  Eric Allman of Sendmail for their help in preparing this
  document.
    _________________________________________________________________

  Feedback can be directed to the author, Art Manion.
  ______________________________________________________________________

  This document is available from:
  http://www.cert.org/advisories/CA-2003-25.html
  ______________________________________________________________________




-- Berhenti langganan: [EMAIL PROTECTED] Arsip dan info: http://linux.or.id/milis.php



Kirim email ke