Korean
<< Back
VID 18043
Severity 40
Port 25
Protocol TCP
Class SMTP
Detailed Description The Sendmail server, according to its version number, has a buffer overflow vulnerability in its DNS handling code.
Sendmail is a freely available, open source Mail Transport Agent (MTA). It is available for most Unix and Linux operating systems. Sendmail versions 8.12.4 and earlier are vulnerable to a buffer overflow in the code that handles DNS responses. By specifying a DNS (Domain Name System) map using a TXT record in a configuration file, a remote attacker can cause an overly long string to be returned from a malicious nameserver, which could overflow a buffer and allow the attacker to execute arbitrary code on the system with root privileges.
The Sendmail Consortium has stated that this vulnerability is not present in the Sendmail configurations that the DNS map option that can trigger the exposure is not enabled.

* Note: Due to the following reasons, this may or may not be considered a security risk in your environment (i.e. It may be a false positive):
1. This check solely relied on the version number of the remote Sendmail server to assess this vulnerability.
2. The version number of the Sendmail server is based on the standard Sendmail distribution released by the Sendmail Consortium.

* Platforms Affected:
Sendmail 8.12.4 and earlier
Linux Any version
Unix Any version

* References:
http://online.securityfocus.com/bid/5122
http://www.iss.net/security_center/static/9443.php
Recommendation Upgrade to the latest version of Sendmail (8.12.5 or later), available from the Sendmail Web site, http://www.sendmail.org/8.12.5.html
Related URL CVE-2002-0906 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)