TIP: Click on subject to list as thread! ANSI
echo: linuxhelp
to: Geo.
from: Randall Parker
date: 2003-09-29 19:59:26
subject: Re: sendmail root exploit.. again

From: Randall Parker 

The fact that sendmail has so many security bugs that allow it to be taken
over in the first place is pathetic. That it runs on most systems as root
is stupid since, as has posted here, it is possible to get it to
  start up using some higher port number that the firewall can present
to the outside world as a lower port number.

I see a lot of ISPs running Postfix. I don't see sendmail when I look at
email headers or email bounce messages. But I do see Postfix there.

Geo. wrote:


> - -----------------------
> - --- Issue Specifics ---
> - -----------------------
>
>  It has been reported that under certain conditions a vulnerability in
>  sendmail could allow a remote attacker to execute arbitrary code with
>  the privileges of the sendmail daemon, typically root. This effects
>  all versions of sendmail including the latest version, 8.12.9.
>
>  For more details please see:
>  http://www.cert.org/advisories/CA-2003-25.html
>  http://www.kb.cert.org/vuls/id/784980
>
> http://lists.netsys.com/pipermail/full-disclosure/2003-September/010287.html
>
>  The Common Vulnerabilities and Exposures project (cve.mitre.org) has
>  assigned the name CAN-2003-0694 to this issue:
>  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0694
>
>

--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)
SEEN-BY: 633/267 270
@PATH: 379/45 1 106/1 2000 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.