Short Name |
SMTP:COMMAND:DEBUG |
---|---|
Severity |
Critical |
Recommended |
No |
Recommended Action |
Drop |
Category |
SMTP |
Keywords |
Debug Command |
Release Date |
2003/04/22 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability against sendmail debug mode. The debug mode allows an e-mail message recipient to be a program that contains all the privileges of the user ID, which sendmail runs (usually root). Attackers can set the shell as the e-mail recipient and include malicious shell commands in the message body.
Sendmail's debug mode allows the recipient of an email message to be a program that runs with the privileges of the user id which sendmail is running under. This user is normally root. This allows an attacker to set the recipient to the shell and include shell commands in the message body. This vulnerability was used by the Morris Worm.