SHARE
Facebook X Pinterest WhatsApp

Sendmail, Beware

Written By
thumbnail
Ryan Naraine
Ryan Naraine
Mar 3, 2003

The Sendmail Consortium has released
version 8.12.8 of its popular open-source Message Transfer Agent (MTA) to
plug a “critical security problem” in header parsing which was discovered by
the Internet Security Systems’ X-Force unit.

Previous versions of Sendmail, which handles between up to 75 percent of
all Internet e-mail traffic, contain a buffer overflow flaw that could give
an attacker ‘root’ or superuser access. All versions of Sendmail from 5.79
to 8.12.7 were found to be vulnerable.

The CERT Coordination Center (CERT/CC) issued a security alert
Monday, warning that “most medium-sized to large organizations are likely to
have at least one vulnerable sendmail server.”

Because Sendmail and all other e-mail servers are typically exposed to
the Internet in order to send and receive Web e-mail, the Center warned that
vulnerable servers cannot be protected by firewalls or packet filters. The
Sendmail security hole is especially dangerous, CERT cautioned, because an
exploit can be launched via e-mail and an intruder does not need specific
knowledge of a target to launch a successful attack.

Researchers found the vulnerability to be message-oriented, as opposed to
connection-oriented, which means it is triggered by the content of a
“specially-crafted email message rather than by lower-level network
traffic.”

“This is important because an MTA that does not contain the vulnerability
will pass the malicious message along to other MTAs that may be protected at
the network level. In other words, vulnerable Sendmail servers on the
interior of a network are still at risk, even if the site’s border MTA uses
software other than Sendmail,” CERT/CC warned.

In urging Sendmail users to immediately apply patches (available for download here, the Center said
the security flaw was likely to draw “significant attention from the intruder
community,” which increases the probability of a public exploit.

There is no known workaround for the Sendmail vulnerability. Until a
patch can be applied, CERT/CC urged users to set the RunAsUser option
to reduce the impact of the flaw.

Recommended for you...

Oracle’s NetBeans Headed to The Apache Software Foundation
Praise Be to the Dockercon 16 Demo Gods : Drink Espresso #dockercon
Facebook Gets Serious about Open-Source
Python 2 Gets New Security Features, Four Years After It was Supposed to Go Away
Internet News Logo

InternetNews is a source of industry news and intelligence for IT professionals from all branches of the technology world. InternetNews focuses on helping professionals grow their knowledge base and authority in their field with the top news and trends in Software, IT Management, Networking & Communications, and Small Business.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.