Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

SMTP:MAJORDOMO:COMMAND-EXEC

Severity

High

Recommended

No

Recommended Action

Drop

Category

SMTP

Keywords

Majordomo Command Execution

Release Date

2003/04/22

Update Number

1213

Supported Platforms

di-5.3+, idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

SMTP: Majordomo Command Execution


This signature detects attempts to exploit a known vulnerability against Great Circle Associates Majordomo, a perl-based Internet email list server. When processing a list command, Majordomo compares the "reply to" email address again the advertise/noadvertise lists (if configured). During this comparison, attackers can trick Majordomo into executing commands when it expands the back-tick operator (used by UNIX to enclose executable commands in a shell command line). Attackers can use this back-tick operator in the "reply to" email header to execute arbitrary commands on the server.

Extended Description

Majordomo is a perl-based Internet e-mail list server. Versions prior to 1.91 are vulnerable to an attack whereby specially crafted e-mail headers are incorrectly processed, yielding the ability to execute arbitrary commands with the privileges of Majordomo. This is possible only when "advertise" or "noadvertise" directives are specified in the configuration files.

Affected Products

  • Great Circle Associates Majordomo 1.89.0
  • Great Circle Associates Majordomo 1.90.0

References

  • BugTraq: 2310
  • CVE: CVE-1999-0207
  • URL: http://www.securityfocus.com/archive/1/7527
  • URL: http://www.greatcircle.com/lists/majordomo-users/mhonarc/majordomo-users.199708/msg00453.html
  • URL: http://archives.neohapsis.com/archives/bugtraq/1994_2/0361.html

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out