what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

S-93-23.asc

S-93-23.asc
Posted Jan 10, 2000

Subject Sendmail vulnerability Date 05-Nov-93

SHA-256 | 678a76c30554de526401bb9348d091a3a22b62e9af3c4a675a6cef5a57d1da5a

S-93-23.asc

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===============================================================================
>> CERT-NL, 01-Mar-2000 <<
>> All CERT-NL information has been moved to http://cert.surfnet.nl. Links <<
>> to CERT-NL information contained in this advisory are therefore outdated. <<
>> <<
>> CERT-NL also has stopped the CERT-CC-Mirror service. Due to this the <<
>> links to the CERT-CC mirror are obsolete. Visit the CERT-CC site for the <<
>> complete CERT-CC advisory texts: http://www.cert.org <<
===============================================================================
===============================================================================
Security Advisory CERT-NL
===============================================================================
Author/Source : CERT-NL (Don Stikvoort) Index : S-93-23
Distribution : World Page : 1
Classification: External Version: Final
Subject : Sendmail vulnerability Date : 05-Nov-93
==============================================================================

*** PLEASE ALSO READ CERT-NL ADVISORY S-94-18 OF 14-JUL-94 ***

CERT-NL received information about a general Sendmail vulnerability,
superseding the information previously released as part of
S-93-21 of 22-Oct-1993 .

We advise you to carefully read this advisory and take appropriate action.

In the below CERT/CC report all details are shown.

We thank CERT/CC for providing this information.

==============================================================================
==============================================================================


The CERT Coordination Center is working on eliminating a vulnerability in
sendmail(8). This vulnerability potentially affects all systems running
sendmail.

CERT is working with the vendor community to address this vulnerability. At
this time, there are no known patches available for any vendor implementation
that fully address this vulnerability. Until there is complete vendor
information, CERT recommends that all implementations of sendmail be
considered susceptible.

CERT will continue to work with the vendors and will alert the community
when patches become available.

Included with this advisory is an appendix describing tips that can be used
by system administrators who are concerned about the possible exploitation
of this vulnerability at their site.

- -----------------------------------------------------------------------------

I. Description

A vulnerability exists in most versions of sendmail that allows
unauthorized remote or local users to execute programs as any system
user other than root.

This vulnerability affects the final destination sendmail host
and can be exploited through an intermediate mail machine. Therefore,
all sendmail recipient machines within a domain are potentially
vulnerable.


II. Impact

Anyone (remote or local) can execute programs on the affected hosts
as any userid other than root.


III. Approaches

CERT suggests three possible approaches to this problem. Although
these approaches address all known aspects of this vulnerability,
they are suggested only until vendor patches for this sendmail
vulnerability are available.

Familiarity with sendmail and its installation and configuration,
is recommended before implementing these modifications.

In order to protect your entire site it is necessary to apply the selected
approach to *ALL* systems running sendmail at the site, and not just
the mail hub.


A. Approach 1

This approach involves modifying the sendmail configuration
to restrict the sendmail program mailer facility.

To restrict sendmail's program mailer facility, obtain
and install the sendmail restricted shell program (smrsh 1.2)
by Eric Allman (the original author of sendmail), following the
directions included with the program.

1. Where to obtain the program

Copies of this program may be obtained via anonymous FTP
(FTP archive also accesible via Gopher):

from ftp.nic.surfnet.nl
in /surfnet/net-security/cert-nl/patches/misc
files smrsh.*


Checksum information:

BSD Sum
30114 5 smrsh.README
25757 2 smrsh.8
46786 5 smrsh.c

System V Sum
56478 10 smrsh.README
42281 4 smrsh.8
65517 9 smrsh.c

MD5 Checksum
MD5 (smrsh.README) = fc4cf266288511099e44b664806a5594
MD5 (smrsh.8) = 35aeefba9714f251a3610c7b1714e355
MD5 (smrsh.c) = d4822ce7c273fc8b93c68e39ec67739c


2. Impacts of this approach

While this approach allows a site to specify which programs
can be run by sendmail (e.g. vacation(1)), attempts to invoke
programs that are not included in the allowed set, or attempts
using shell meta-characters (see smrsh program listing for a
complete set of disallowed characters), will fail, resulting in
log output to the syslog(3) facility. Programs that are
specified in a site's /etc/aliases file should be considered
for inclusion in the allowable program list.

Since .forward files allow user-specified programs to be
run by sendmail, a survey of the contents of the system's
.forward files may be required to prevent failure to deliver
user mail.

*** WARNING ***************************************************
* It is very important that sites *NOT* include interpreter *
* programs (e.g. /bin/sh, /bin/csh, /bin/perl, /bin/uudecode, *
* /bin/sed, ...) in the list of allowed programs. *
***************************************************************


B. Approach 2

Like approach 1, this approach involves modifying the sendmail
configuration. However, this approach completely disables the
sendmail program mailer facility. This is a drastic, but quick
action that can be taken while a site installs one of the
other suggestions. Before implementing this approach, save a copy
of the current sendmail configuration file.

To implement this approach edit the sendmail.cf file:

change from:
Mprog, P=/bin/sh, F=slFDM, S=10, R=20, A=sh -c $u

to:
Mprog, P=/bin/false, F=, S=10, R=20, A=

Any changes to the sendmail.cf file will require that the
sendmail process be restarted to ensure that the new configuration
is used. See item 3 in Appendix A for more details.

1. Impacts of this approach

Attempts to invoke programs through sendmail will not
be successful.


C. Approach 3

To the best of our knowledge, Eric Allman's public domain
implementation of sendmail, sendmail 8.6.4, does not appear to
be susceptible to this vulnerability. A working solution would
then be to replace a site's sendmail, with sendmail 8.6.4.

1. Where to obtain the program

Copies of this version of sendmail may be obtained via
anonymous FTP from ftp.cs.berkeley.edu in the
/ucb/sendmail directory.

Checksum information:

BSD Sum
sendmail.8.6.4.base.tar.Z: 07718 428
sendmail.8.6.4.cf.tar.Z: 28004 179
sendmail.8.6.4.misc.tar.Z: 57299 102
sendmail.8.6.4.xdoc.tar.Z: 33954 251

System V Sum
64609 856 sendmail.8.6.4.base.tar.Z
42112 357 sendmail.8.6.4.cf.tar.Z
8101 203 sendmail.8.6.4.misc.tar.Z
50037 502 sendmail.8.6.4.xdoc.tar.Z

MD5 Checksum
MD5 (sendmail.8.6.4.base.tar.Z) = 59727f2f99b0e47a74d804f7ff654621
MD5 (sendmail.8.6.4.cf.tar.Z) = cb7ab7751fb8b45167758e9485878f6f
MD5 (sendmail.8.6.4.misc.tar.Z) = 8eaa6fbe9e9226667f719af0c1bde755
MD5 (sendmail.8.6.4.xdoc.tar.Z) = a9da24e504832f21a3069dc2151870e6


2. Impacts of this workaround

Depending upon the currently installed sendmail program,
switching to a different sendmail may require significant
effort for the system administrator to become familiar with
the new program. The site's sendmail configuration file
may require considerable modification in order to provide
existing functionality. In some cases, the site's sendmail
configuration file may be incompatible with the sendmail 8.6.4
configuration file.


- ---------------------------------------------------------------------------
The CERT Coordination Center wishes to thank the members of the following
response teams for their assistance in analyzing and testing both the
problem and the solutions: SERT, ASSIST, CIAC, and DFN-CERT. CERT would
especially like to thank Eric Allman, Matt Blaze, Andy Sherman, Gene Spafford,
Tim Seaver, and many others who have provided technical assistance with
this effort.
- ---------------------------------------------------------------------------



Appendix A
==========

This appendix describes tips that can be used by system administrators
who are concerned about the possible exploitation of this vulnerability at
their site.


There are two actions that can be taken by system administrators to try
to detect the exploitation of this vulnerability at their sites.

- Examine all bounced mail to look for unusual occurrences.
- Examine syslog files for unusual occurrences of "|" characters

In order to do this, sendmail must be configured to direct bounced mail to
the postmaster (or other designated person who will examine the bounced mail).
Sendmail must also be configured to provide adequate logging.

1) To direct bounced mail to the postmaster, place the following entry in
the options part of the general configuration information section of
the sendmail.cf file.

# Cc my postmaster on error replies I generate
OPpostmaster

2) To set sendmail's logging level, place the following entry in the options
part of the general configuration information section of the sendmail.cf
file. Note that the logging level should be 9 or higher in order to provide
adequate logging.

# log level
OL9

3) Once changes have been made in the sendmail configuration file,
it will be necessary to kill all existing sendmail processes,
refreeze the configuration file (if needed - see the note below),
and restart the sendmail program.

Here is an example from SunOS 4.1.2:

As root:

# /usr/bin/ps -aux | /usr/bin/grep sendmail
root 130 0.0 0.0 168 0 ? IW Oct 2 0:10 /usr/lib/sendmail -bd -q
# /bin/kill -9 130 (kill the current sendmail process)
# /usr/lib/sendmail -bz (create the configuration freeze file)
# /usr/lib/sendmail -bd -q30m (run the sendmail daemon)


**Note: Some sites do not use frozen configuration files and some do. If
your site is using frozen configuration files, there will be a file
named sendmail.fc in the same directory as the sendmail configuration
file (sendmail.cf).



==============================================================================
==============================================================================
CERT-NL is the Computer Emergency Response Team for SURFnet customers. SURFnet
is the Dutch network for educational, research and related institutes. CERT-NL
is a member of the Forum of Incident Response and Security Teams (FIRST).

All CERT-NL material is available under:
http://cert.surfnet.nl/

In case of computer or network security problems please contact your local
CERT/security-team or CERT-NL (if your institute is NOT a SURFnet customer
please address the appropriate (local) CERT/security-team).

CERT-NL is one/two hour(s) ahead of UTC (GMT) in winter/summer,
i.e. UTC+0100 in winter and UTC+0200 in summer (DST).

Email: cert-nl@surfnet.nl ATTENDED REGULARLY ALL DAYS
Phone: +31 302 305 305 BUSINESS HOURS ONLY
Fax: +31 302 305 329 BUSINESS HOURS ONLY
Snailmail: SURFnet bv
Attn. CERT-NL
P.O. Box 19035
NL - 3501 DA UTRECHT
The Netherlands

NOODGEVALLEN: 06 22 92 35 64 ALTIJD BEREIKBAAR
EMERGENCIES : +31 6 22 92 35 64 ATTENDED AT ALL TIMES
CERT-NL'S EMERGENCY PHONENUMBER IS ONLY TO BE USED IN CASE OF EMERGENCIES:
THE SURFNET HELPDESK OPERATING THE EMERGENCY NUMBER HAS A *FIXED*
PROCEDURE FOR DEALING WITH YOUR ALERT AND WILL IN REGULAR CASES RELAY IT
TO CERT-NL IN AN APPROPRIATE MANNER. CERT-NL WILL THEN CONTACT YOU.
===============================================================================

-----BEGIN PGP SIGNATURE-----
Version: PGP 6.5.1i

iQA/AwUBOL6WCzSYjBqwfc9jEQLGUwCgvGZyKgYb8KGI2X8Ov1ID9kUpS/IAn1EL
BZ5pUWgS2LsUSbH1Ro9OcyG1
=pBCK
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close