Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

SMTP:OVERFLOW:SENDMAIL-MIME-OF

Severity

Critical

Recommended

No

Recommended Action

Drop

Category

SMTP

Keywords

Sendmail MIME Conversion Buffer Overflow

Release Date

2003/04/25

Update Number

1213

Supported Platforms

di-5.3+, idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

SMTP: Sendmail MIME Conversion Buffer Overflow


This signature detects attempts to exploit a known vulnerability against Sendmail. Sendmail versions 8.8.0 and 8.8.1 are vulnerable. Attackers can embed a maliciously crafted MIME header in an email to overflow a buffer in Sendmail and execute arbitrary commands as root.

Extended Description

Modutils is a component of many linux systems that includes tools for using loadable kernel modules. One of these tools, modprobe, loads a set of modules that correspond to a provided "name" (passed at the command line) automatically. Modprobe version 2.3.9 and possibly others around it contain a vulnerability (present since March 12, 1999) that can lead to a local root compromise. The problem has to do with modprobe using popen() to execute the "echo" program argumented with user input. Because popen() relies on /bin/sh to parse the command string and execute "echo", unescaped shell metacharacters can be included in user input to execute other commands. Though modprobe is not installed setuid root, this vulnerability can be exploited to gain root access provided the target system is using kmod. Kmod is a kernel facility that automatically executes the program 'modprobe' when a module is requested via request_module(). One program that does this is the version of ping that ships with RedHat Linux 7.0. When a device is specified at the command-line that doesnt exist, request_module is called with the user-supplied arguments passed to the kernel. The kernel then takes the arguments and exec's modprobe with them. Arbitrary commands included in the argument for module name (device name to ping) are then executed when popen() is called as root. Successful exploitation of this will yield root access for the attacker.

Affected Products

  • Conectiva Linux 5.1.0
  • GNU Linux modutils 2.3.9
  • Mandriva Linux Mandrake 7.2.0
  • Red Hat Linux 7.0.0
  • SuSE Linux 6.4.0
  • SuSE Linux 7.0.0

References

  • BugTraq: 1936
  • CERT: CA-1996-24
  • CVE: CVE-1999-0206

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out