Page 1 of 2 12 LastLast
Results 1 to 15 of 17

Thread: Sendmail root exploit

  1. #1
    Did you SEQ today? BlueAdept's Avatar
    Join Date
    Dec 2001
    Posts
    2,014

    Sendmail root exploit

    Just wanted to let everyone know that they should use up2date or just update their sendmail rpms. This root expoit affects all linux distros that have versions below 8.12.8.

    ----------------------------------------------------------------------------------

    From Redhat's site:

    Updated Sendmail packages are available to fix a vulnerability that may allow remote attackers to gain root privileges by sending a carefully crafted message.

    These packages also fix a security bug if sendmail is configured to use smrsh.

    Sendmail is a widely used Mail Transport Agent (MTA) which is included in all Red Hat Linux distributions.

    During a code audit of Sendmail by ISS, a critical vulnerability was
    uncovered that affects unpatched versions of Sendmail prior to version 8.12.8. A remote attacker can send a carefully crafted email message which, when processed by sendmail, causes arbitrary code to be executed as root.

    We are advised that a proof-of-concept exploit is known to exist, but is not believed to be in the wild.

    Since this is a message-based vulnerability, MTAs other than Sendmail may pass on the carefully crafted message. This means that unpatched versions of Sendmail inside a network could still be at risk even if they do not accept external connections directly.

    In addition, the restricted shell (SMRSH) in Sendmail allows attackers to bypass the intended restrictions of smrsh by inserting additional commands after "||" sequences or "/" characters, which are not properly iltered or verified. A sucessful attack would allow an attacker who has a local account on a system which has explicitly enabled smrsh to execute arbitrary
    binaries as themselves by utilizing their .forward file.

    All users are advised to update to these erratum packages. For Red Hat Linux 8.0 we have included Sendmail version 8.12.8 which is not vulnerable to these issues. For all other distributions we have included a backported patch which corrects these vulnerabilities.

    Red Hat would like to thank Eric Allman for his assistance with this
    vulnerability.
    Filters for ShowEQ can now be found here. filters-5xx-06-20-05.tar.gz

    ShowEQ file section is here. https://sourceforge.net/project/show...roup_id=10131#

    Famous Quotes:

    Ratt: WTF you talkin' about BA? (Ok.. that sounds like a bad combo of Diffrent Strokes and A-Team)

    Razzle: I showeq my wife

  2. #2
    Registered User
    Join Date
    Dec 2001
    Posts
    411
    apt-get update
    apt-get dist-upgrade

    ~~

    i had new deb packages upgraded before i even got the mail from CERT yesterday, makes me happy.
    casey AT trifocus DOT net

  3. #3
    Registered User
    Join Date
    Dec 2001
    Posts
    152
    For the benefit of others running older RH systems (7.0s here) you may see dependency troubles linking back to openssl. The following link explained it best:

    http://www.der-keiler.de/Newsgroups/...2-03/0339.html

    Just a little RH fun :/
    --------
    - Catt

    >SELECT * FROM users WHERE clue > 0;
    0 rows returned
    /em sigh

  4. #4
    Registered User
    Join Date
    Jan 2002
    Posts
    87
    Looks like an exploit has been posted

    Hackers' code exploits Sendmail flaw

  5. #5
    Registered User
    Join Date
    Aug 2002
    Posts
    143
    Best solution: Don't run sendmail.

  6. #6
    Registered User
    Join Date
    Dec 2001
    Posts
    152
    No, THE best solution is unplug the wire.

    Sendmail works very well for me, and I can't recall the last security flaw it had. Pretty good record in my book.

    If you like Exchange and think it's better (cough) use it.

    Otherwise, patch it and move on.
    --------
    - Catt

    >SELECT * FROM users WHERE clue > 0;
    0 rows returned
    /em sigh

  7. #7
    Registered User
    Join Date
    Dec 2001
    Posts
    411
    he was probably insinuating that postfix is the answer.

    sendmail 4ever ~

    i hope he didnt mean qmail (ICK) or exim
    casey AT trifocus DOT net

  8. #8
    Registered User
    Join Date
    Aug 2002
    Posts
    143
    I can't recall the last security flaw it had
    I'm guessing you weren't around in the early 90s when sendmail was one of the biggest security flaw generators in existance? Even since then it still generates minor exploits a couple of times a year. If you need to refresh your memory, head on over to ISS:

    http://www.iss.net/security_center/s...ay=all&show=30

    I'm not entirely sure where you got the idea that Exchange was a drop-in replacement for Sendmail (or vice versa) - it isn't. They do entirely separate things and were built with very different purposes. Sendmail is an MTA. Exchange contains MTAs but is a lot, lot more.

    All I was suggesting with Sendmail was that standardizing on a single MTA with a known history of faults isn't a good idea. It's certainly the most flexible MTA out there but a little diversity is always a good thing in limiting the security vulnerabilities your network is open to. Postfix and qmail are both good alternates to introduce this variance.

  9. #9
    Registered User
    Join Date
    Jan 2002
    Posts
    1,508
    On the same note with sendmail, I'm surprised at the number of companies that standarize on Exchange. It seems to have just as many vulnerabilities as Sendmail (if not more) each year and as we've been discovering here, seems to have real problems if the network connection goes down and then back up (as we found when changing our core from cheap switches to Cisco switches). We had to fully reboot the Exchange system to get it back up.

  10. #10
    Registered User
    Join Date
    Apr 2002
    Posts
    45
    I would say a couple of reasons..

    You dont have to be extraordinarly bright to get Exchange up and working well.

    And your Admins don't demand 6 figure salaries.

  11. #11
    Developer Ratt's Avatar
    Join Date
    Dec 2001
    Posts
    533
    You guys are all smoking crack. Exim > Sendmail by a long shot...
    The problem with defending the purity of the English language is that English is about as pure as a cribhouse whore. We don't just borrow words; on occasion, English has pursued other languages down alleyways to beat them unconscious and riffle their pockets for new vocabulary.

  12. #12
    Registered User
    Join Date
    Aug 2002
    Posts
    143
    There's no reason to choose Exchange over Sendmail. I'd actually recommend sticking a unix MTA in front of an Exchange server (if that's the groupware solution you wanted) simply because I don't like exposing core business servers to a direct (or proxied) internet connection.

    Unix MTAs are a lot faster and more efficient than the Exchance IMC as well.

    As for "easy to set up Exchange", I call bullshit on that one. It's just great to install and run in MSCE classes but as soon as you get into the real world and have to deploy a smooth upgrade on a 5,000 employee network where someone's decided to switch to a new Active Directory schema from the one you originally deployed then things get tricky really fast.

    Exchange is soooo not worth it if you're just doing email.

  13. #13
    Registered User
    Join Date
    Oct 2002
    Posts
    15
    Heh,

    Can't remember the last time sendmail had a security hole?

    I suppose BIND works great for you too, zero holes!


    .zfod

  14. #14
    Registered User
    Join Date
    May 2002
    Posts
    92
    Oh my God! Linux isn't a 100% secure OS? Listen to this group and you'd think Windows was the bane of all evil, and Linux was Fort Knox. I'm shocked!

    Nice to have a little reality posted in these Linux based forums once in a blue moon.

  15. #15
    Did you SEQ today? BlueAdept's Avatar
    Join Date
    Dec 2001
    Posts
    2,014
    Originally posted by sauron
    Oh my God! Linux isn't a 100% secure OS? Listen to this group and you'd think Windows was the bane of all evil, and Linux was Fort Knox. I'm shocked!

    Nice to have a little reality posted in these Linux based forums once in a blue moon.
    Yea, but since this was posted, two more severe holes were found in Win2k and one in WinXP.
    Filters for ShowEQ can now be found here. filters-5xx-06-20-05.tar.gz

    ShowEQ file section is here. https://sourceforge.net/project/show...roup_id=10131#

    Famous Quotes:

    Ratt: WTF you talkin' about BA? (Ok.. that sounds like a bad combo of Diffrent Strokes and A-Team)

    Razzle: I showeq my wife

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

You may post new threads
You may post replies
You may post attachments
You may edit your posts
HTML code is Off
vB code is On
Smilies are On
[IMG] code is On