{"id":54,"date":"2003-04-01T13:25:47","date_gmt":"2003-04-01T20:25:47","guid":{"rendered":"http:\/\/blogs.pugetsound.edu\/TSmaintenance\/?p=54"},"modified":"2003-04-01T13:25:47","modified_gmt":"2003-04-01T20:25:47","slug":"sendmail-patch","status":"publish","type":"post","link":"https:\/\/blogs.pugetsound.edu\/tsmaintenance\/2003\/04\/01\/sendmail-patch\/","title":{"rendered":"Sendmail patch"},"content":{"rendered":"<p>Added patch to Sendmail 8.11.6 to fix buffer overflow problem reported on March 29, 2003 per CERT Advisory CA-2003-12 Buffer Overflow in Sendmail<br \/>\nhttp:\/\/www.kb.cert.org\/vuls\/id\/897604<br \/>\n<!--more--><br \/>\n&#8212;&#8211;BEGIN PGP SIGNED MESSAGE&#8212;&#8211;<\/p>\n<p>CERT Advisory CA-2003-12 Buffer Overflow in Sendmail<\/p>\n<p>   Original release date: March 29, 2003<br \/>\n   Last revised:<br \/>\n   Source: CERT\/CC<\/p>\n<p>   A complete revision history can be found at the end of this file.<\/p>\n<p>Systems Affected<\/p>\n<p>     * Sendmail Pro (all versions)<br \/>\n     * Sendmail Switch 2.1 prior to 2.1.6<br \/>\n     * Sendmail Switch 2.2 prior to 2.2.6<br \/>\n     * Sendmail Switch 3.0 prior to 3.0.4<br \/>\n     * Sendmail for NT 2.X prior to 2.6.3<br \/>\n     * Sendmail for NT 3.0 prior to 3.0.4<br \/>\n     * Systems  running  open-source  sendmail  versions prior to 8.12.9,<br \/>\n       including UNIX and Linux systems<\/p>\n<p>Overview<\/p>\n<p>   There  is a vulnerability in sendmail that can be exploited to cause a<br \/>\n   denial-of-service  condition  and  could  allow  a  remote attacker to<br \/>\n   execute  arbitrary  code  with  the privileges of the sendmail daemon,<br \/>\n   typically root.<\/p>\n<p>I. Description<\/p>\n<p>   There  is  a remotely exploitable vulnerability in sendmail that could<br \/>\n   allow  an  attacker  to  gain control of a vulnerable sendmail server.<br \/>\n   Address  parsing code in sendmail does not adequately check the length<br \/>\n   of  email addresses. An email message with a specially crafted address<br \/>\n   could  trigger  a stack overflow. This vulnerability was discovered by<br \/>\n   Michal Zalewski.<\/p>\n<p>   This vulnerability is different than the one described in CA-2003-07.<\/p>\n<p>   Most  organizations  have  a variety of mail transfer agents (MTAs) at<br \/>\n   various  locations  within their network, with at least one exposed to<br \/>\n   the   Internet.   Since   sendmail  is  the  most  popular  MTA,  most<br \/>\n   medium-sized  to  large  organizations are likely to have at least one<br \/>\n   vulnerable   sendmail   server.  In  addition,  many  UNIX  and  Linux<br \/>\n   workstations  provide  a  sendmail  implementation that is enabled and<br \/>\n   running by default.<\/p>\n<p>   This    vulnerability    is    message-oriented    as    opposed    to<br \/>\n   connection-oriented. That means that the vulnerability is triggered by<br \/>\n   the  contents  of  a  specially-crafted  email  message rather than by<br \/>\n   lower-level  network  traffic.  This  is important because an MTA that<br \/>\n   does  not  contain  the  vulnerability will pass the malicious message<br \/>\n   along  to  other  MTAs  that may be protected at the network level. In<br \/>\n   other  words, vulnerable sendmail servers on the interior of a network<br \/>\n   are  still  at risk, even if the site&#8217;s border MTA uses software other<br \/>\n   than sendmail. Also, messages capable of exploiting this vulnerability<br \/>\n   may pass undetected through many common packet filters or firewalls.<\/p>\n<p>   This   vulnerability  has  been  successfully  exploited  to  cause  a<br \/>\n   denial-of-service   condition  in  a  laboratory  environment.  It  is<br \/>\n   possible that this vulnerability could be used to execute code on some<br \/>\n   vulnerable systems.<\/p>\n<p>   The CERT\/CC is tracking this issue as VU#897604. This reference number<br \/>\n   corresponds to CVE candidate CAN-2003-0161.<\/p>\n<p>   For more information, please see<\/p>\n<p>          http:\/\/www.sendmail.org<br \/>\n          http:\/\/www.sendmail.org\/8.12.9.html<br \/>\n          http:\/\/www.sendmail.com\/security\/<\/p>\n<p>   For  the  latest  information  about this vulnerability, including the<br \/>\n   most recent vendor information, please see<\/p>\n<p>          http:\/\/www.kb.cert.org\/vuls\/id\/897604<\/p>\n<p>   This vulnerability is distinct from VU#398025.<\/p>\n<p>II. Impact<\/p>\n<p>   Successful   exploitation   of   this   vulnerability   may   cause  a<br \/>\n   denial-of-service   condition   or  allow  an  attacker  to  gain  the<br \/>\n   privileges  of  the  sendmail  daemon, typically root. Even vulnerable<br \/>\n   sendmail  servers  on  the  interior of a given network may be at risk<br \/>\n   since  the  vulnerability  is triggered by the contents of a malicious<br \/>\n   email message.<\/p>\n<p>III. Solution<\/p>\n<p>Apply a patch from Sendmail, Inc.<\/p>\n<p>   Sendmail  has produced patches for versions 8.9, 8.10, 8.11, and 8.12.<br \/>\n   However,  the  vulnerability  also  exists  in earlier versions of the<br \/>\n   code;  therefore,  site  administrators  using  an earlier version are<br \/>\n   encouraged  to upgrade to 8.12.9. These patches, and a signature file,<br \/>\n   are located at<\/p>\n<p>          ftp:\/\/ftp.sendmail.org\/pub\/sendmail\/prescan.tar.gz.uu<br \/>\n          ftp:\/\/ftp.sendmail.org\/pub\/sendmail\/prescan.tar.gz.uu.asc<\/p>\n<p>Apply a patch from your vendor<\/p>\n<p>   Many  vendors  include  vulnerable  sendmail  servers as part of their<br \/>\n   software distributions. We have notified vendors of this vulnerability<br \/>\n   and  recorded  the  statements  they  provided  in  Appendix A of this<br \/>\n   advisory.  The  most  recent  vendor  information  can be found in the<br \/>\n   systems affected section of VU#897604.<\/p>\n<p>Enable the RunAsUser option<\/p>\n<p>   There is no known workaround for this vulnerability. Until a patch can<br \/>\n   be  applied,  you  may  wish to set the RunAsUser option to reduce the<br \/>\n   impact  of this vulnerability. As a good general practice, the CERT\/CC<br \/>\n   recommends  limiting  the  privileges  of  an  application  or service<br \/>\n   whenever possible.<\/p>\n<p>Appendix A. &#8211; Vendor Information<\/p>\n<p>   This  appendix  contains  information  provided  by  vendors  for this<br \/>\n   advisory.  As  vendors  report new information to the CERT\/CC, we will<br \/>\n   update this section and note the changes in our revision history. If a<br \/>\n   particular  vendor  is  not  listed  below, we have not received their<br \/>\n   comments.<\/p>\n<p>Red Hat Inc.<\/p>\n<p>   Red  Hat  distributes  sendmail in all Red Hat Linux distributions. We<br \/>\n   are  currently [Mar29] working on producing errata packages to correct<br \/>\n   this  issue,  when  complete  these  will  be available along with our<br \/>\n   advisory  at  the  URL  below.  At  the same time users of the Red Hat<br \/>\n   Network will be able to update their systems using the &#8216;up2date&#8217; tool.<\/p>\n<p>   Red Hat Linux:<\/p>\n<p>          http:\/\/rhn.redhat.com\/errata\/RHSA-2003-120.html<\/p>\n<p>   Red Hat Enterprise Linux:<\/p>\n<p>          http:\/\/rhn.redhat.com\/errata\/RHSA-2003-121.html<\/p>\n<p>The Sendmail Consortium<\/p>\n<p>   The  Sendmail  Consortium  recommends  that  sites  upgrade  to 8.12.9<br \/>\n   whenever possible. Alternatively, patches are available for 8.9, 8.10,<br \/>\n   8.11, and 8.12 on http:\/\/www.sendmail.org\/.<\/p>\n<p>Sendmail, Inc.<\/p>\n<p>   All  commercial  releases including Sendmail Switch, Sendmail Advanced<br \/>\n   Message  Server (which includes the Sendmail Switch MTA), Sendmail for<br \/>\n   NT,  and Sendmail Pro are affected by this issue. Patch information is<br \/>\n   available at http:\/\/www.sendmail.com\/security\/.<br \/>\n     _________________________________________________________________<\/p>\n<p>   Our  thanks  to  Eric  Allman,  Claus  Assmann, Greg Shapiro, and Dave<br \/>\n   Anderson  of  Sendmail  for  reporting  this  problem  and  for  their<br \/>\n   assistance in coordinating the response to this problem. We also thank<br \/>\n   Michal Zalewski for discovering this vulnerability.<br \/>\n     _________________________________________________________________<\/p>\n<p>   Authors: Art Manion and Shawn V. Hernan<br \/>\n   ______________________________________________________________________<\/p>\n<p>   This document is available from:<br \/>\n   http:\/\/www.cert.org\/advisories\/CA-2003-12.html<br \/>\n   ______________________________________________________________________<\/p>\n<p>CERT\/CC Contact Information<\/p>\n<p>   Email: cert@cert.org<br \/>\n          Phone: +1 412-268-7090 (24-hour hotline)<br \/>\n          Fax: +1 412-268-6989<br \/>\n          Postal address:<br \/>\n          CERT Coordination Center<br \/>\n          Software Engineering Institute<br \/>\n          Carnegie Mellon University<br \/>\n          Pittsburgh PA 15213-3890<br \/>\n          U.S.A.<\/p>\n<p>   CERT\/CC   personnel   answer  the  hotline  08:00-17:00  EST(GMT-5)  \/<br \/>\n   EDT(GMT-4)  Monday  through  Friday;  they are on call for emergencies<br \/>\n   during other hours, on U.S. holidays, and on weekends.<\/p>\n<p>Using encryption<\/p>\n<p>   We  strongly  urge you to encrypt sensitive information sent by email.<br \/>\n   Our public PGP key is available from<br \/>\n   http:\/\/www.cert.org\/CERT_PGP.key<\/p>\n<p>   If  you  prefer  to  use  DES,  please  call the CERT hotline for more<br \/>\n   information.<\/p>\n<p>Getting security information<\/p>\n<p>   CERT  publications  and  other security information are available from<br \/>\n   our web site<br \/>\n   http:\/\/www.cert.org\/<\/p>\n<p>   To  subscribe  to  the CERT mailing list for advisories and bulletins,<br \/>\n   send  email  to majordomo@cert.org. Please include in the body of your<br \/>\n   message<\/p>\n<p>   subscribe cert-advisory<\/p>\n<p>   *  &#8220;CERT&#8221;  and  &#8220;CERT  Coordination Center&#8221; are registered in the U.S.<br \/>\n   Patent and Trademark Office.<br \/>\n   ______________________________________________________________________<\/p>\n<p>   NO WARRANTY<br \/>\n   Any  material furnished by Carnegie Mellon University and the Software<br \/>\n   Engineering  Institute  is  furnished  on  an  &#8220;as is&#8221; basis. Carnegie<br \/>\n   Mellon University makes no warranties of any kind, either expressed or<br \/>\n   implied  as  to  any matter including, but not limited to, warranty of<br \/>\n   fitness  for  a  particular purpose or merchantability, exclusivity or<br \/>\n   results  obtained from use of the material. Carnegie Mellon University<br \/>\n   does  not  make  any warranty of any kind with respect to freedom from<br \/>\n   patent, trademark, or copyright infringement.<br \/>\n     _________________________________________________________________<\/p>\n<p>   Conditions for use, disclaimers, and sponsorship information<\/p>\n<p>   Copyright 2003 Carnegie Mellon University.<br \/>\n   Revision History<\/p>\n<p>   March 29,2003: Initial release<\/p>\n<p>&#8212;&#8211;BEGIN PGP SIGNATURE&#8212;&#8211;<br \/>\nVersion: PGP 6.5.8<\/p>\n<p>iQCVAwUBPoX5XGjtSoHZUTs5AQHvjgQAqTy3GQnszPHtUnUBX7VDM4NKSesFHHvC<br \/>\n2JmDAMPYmCO2b32xvWDmMcWdPhOBmJLB2o6zv7mRWX1K0B1GN5TBErIii6dxTaDD<br \/>\nOAUNjirMGdTr+WnxIjdk0gj57JbOU6ZdHHcAijG5SE\/dZq4sMrOCGEAMJTVNDzYp<br \/>\nBtHbFwDeLEY=<br \/>\n=dgBI<br \/>\n&#8212;&#8211;END PGP SIGNATURE&#8212;&#8211;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Added patch to Sendmail 8.11.6 to fix buffer overflow problem reported on March 29, 2003 per CERT Advisory CA-2003-12 Buffer Overflow in Sendmail http:\/\/www.kb.cert.org\/vuls\/id\/897604<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[41],"tags":[],"class_list":["post-54","post","type-post","status-publish","format-standard","hentry","category-patches-upgrades"],"_links":{"self":[{"href":"https:\/\/blogs.pugetsound.edu\/tsmaintenance\/wp-json\/wp\/v2\/posts\/54","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.pugetsound.edu\/tsmaintenance\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.pugetsound.edu\/tsmaintenance\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/tsmaintenance\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/tsmaintenance\/wp-json\/wp\/v2\/comments?post=54"}],"version-history":[{"count":0,"href":"https:\/\/blogs.pugetsound.edu\/tsmaintenance\/wp-json\/wp\/v2\/posts\/54\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.pugetsound.edu\/tsmaintenance\/wp-json\/wp\/v2\/media?parent=54"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/tsmaintenance\/wp-json\/wp\/v2\/categories?post=54"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.pugetsound.edu\/tsmaintenance\/wp-json\/wp\/v2\/tags?post=54"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}