Korean
<< Back
VID 18020
Severity 40
Port 25
Protocol TCP
Class SMTP
Detailed Description The sendmail server, according to its version number, is running a sendmail version 8.7 through 8.8.2. Sendmail versions 8.7 through 8.8.2 could allow non-root users to invoke the Sendmail process in daemon mode. In daemon mode, Sendmail acts as an Internet server, listening to the SMTP port. By manipulating certain variables in the environment, a local user could cause the Sendmail process to execute arbitrary commands with root privileges. Exploit information for this vulnerability is widely available.

* Note: Due to the following reasons, this may or may not be considered a security risk in your environment (i.e. It may be a false positive):
1. This check solely relied on the version number of the remote Sendmail server to assess this vulnerability.
2. The version number of the Sendmail server is based on the standard Sendmail distribution released by the Sendmail Consortium.

* References:
http://www.securityfocus.com/bid/716
http://www.iss.net/security_center/static/1837.php
Recommendation Upgrade to the latest version of Sendmail (8.12.2 or later), available from the Sendmail Consortium Web site, http://www.sendmail.org/

* Refer to the CERT advisory at the following site for the detailed solution about this vulnerability:
http://www.cert.org/advisories/CA-1996-24.html
Related URL CVE-1999-0130 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)