Korean
<< Back
VID 18055
Severity 40
Port 25
Protocol TCP
Class SMTP
Detailed Description Sendmail 8.6.9 allows remote attackers to execute root commands, using IDENT.
Sendmail is a Mail Transport Agent (MTA) used on many Unix-based operating systems. A buffer overflow vulnerability in the IDENT function of Sendmail 8.6.9 could allow attackers to obtain remote root access. Sendmail version 8.6.9 connects back to the IDENT service to log user information. This version of Sendmail does not validate the information returned by the client. If the response by the client passed to Sendmail is longer than expected, the response overflows the buffer. This could allow a remote attacker to execute commands on the affected system with root privileges.

* Note: Due to the following reasons, this may or may not be considered a security risk in your environment (i.e. It may be a false positive):
1. This check solely relied on the version number of the remote Sendmail server to assess this vulnerability.
2. The version number of the Sendmail server is based on the standard Sendmail distribution released by the Sendmail Consortium.

* References:
http://www.ciac.org/ciac/bulletins/f-13.shtml
http://archives.neohapsis.com/archives/bugtraq/1995_1/0470.html
http://www.cert.org/advisories/CA-95.05.sendmail.vulnerabilities

* Platforms Affected:
Sendmail 8.6.9
ConvexOS Any version
DG/UX Any version
HP Apollo Domain/OS 10.3
HP-UX Any version
IRIX Any version
Linux Any version
NeXTSTEP Any version
SCO Unix Any version
Solaris Any version
UNICOS Any version
Ultrix Any version
lftpd Any version
Recommendation Upgrade to the latest version of Sendmail (8.12.10 or later), available from the Sendmail Web site at http://www.sendmail.org/8.12.10.html

For other distributions:
Contact your vendor for upgrade or patch information. See http://www.cert.org/advisories/CA-95.05.sendmail.vulnerabilities
Related URL CVE-1999-0204 (CVE)
Related URL 2311 (SecurityFocus)
Related URL 627 (ISS)