[Dshield] critical sendmail problem.
jullrich at euclidian.com
Mon Mar 3 17:20:30 GMT 2003
> Internet Security Systems Security Advisory
> March 3, 2002
> Remote Sendmail Header Processing Vulnerability
> ISS X-Force has discovered a buffer overflow vulnerability in the
> Mail Transfer Agent (MTA). Sendmail is the most common MTA and has
> documented to handle between 50% and 75% of all Internet email
> Attackers may remotely exploit this vulnerability to gain "root" or
> control of any vulnerable Sendmail server. Sendmail and all other
> servers are typically exposed to the Internet in order to send and
> Internet email. Vulnerable Sendmail servers will not be protected by
> security devices such as firewalls and/or packet filters. This
> is especially dangerous because the exploit can be delivered within an
> message and the attacker doesn't need any specific knowledge of the
> target to
> launch a successful attack.
> Affected Versions:
> Sendmail versions from 5.79 to 8.12.7 are vulnerable
> Note: The affected versions of Sendmail commercial, Sendmail open
> running on all platforms are known to be vulnerable.
> For the complete ISS X-Force Security Advisory, please visit:
> About Internet Security Systems (ISS)
> Founded in 1994, Internet Security Systems (ISS) (Nasdaq: ISSX) is a
> pioneer and world leader in software and services that protect
> online resources from an ever-changing spectrum of threats and misuse.
> Internet Security Systems is headquartered in Atlanta, GA, with
> additional operations throughout the Americas, Asia, Australia, Europe
> and the Middle East.
> Copyright (c) 2003 Internet Security Systems, Inc. All rights reserved
> Permission is hereby granted for the electronic redistribution of this
> document. It is not to be edited or altered in any way without the
> express written consent of the Internet Security Systems X-Force. If
> you wish to reprint the whole or any part of this document in any
> medium excluding electronic media, please email xforce at iss.net for
> Disclaimer: The information within this paper may change without
> Use of this information constitutes acceptance for use in an AS IS
> condition. There are NO warranties, implied or otherwise, with regard
> this information or its use. Any use of this information is at the
> user's risk. In no event shall the author/distributor (Internet
> Systems X-Force) be held liable for any damages whatsoever arising out
> of or in connection with the use or spread of this information.
> X-Force PGP Key available on MIT's PGP key server and PGP.com's key
> as well as at <http://www.iss.net/security_center/sensitive.php>
> Please send suggestions, updates, and comments to: X-Force
> xforce at iss.net of Internet Security Systems, Inc.
More information about the list