Sendmail flaw puts systems at risk, again

Systems running sendmail are at risk of hacker attacks because of a flaw in the way the commonly used e-mail server software handles long e-mail addresses, experts warned Saturday. This second serious bug announced this month has some sendmail users looking for alternatives.

Sendmail does not adequately check the length of e-mail addresses. An e-mail message with a specially crafted address can trigger a stack overflow, potentially allowing an attacker to gain control of a vulnerable sendmail server, the CERT Coordination Center warned in an advisory Saturday. ( http://www.cert.org/advisories/CA-2003-12.html)

Sendmail servers that aren’t directly connected to the Internet are also at risk, since the vulnerability is triggered by the contents of a malicious e-mail message that can be handed on from server to server, CERT said.

Many vendors distribute vulnerable versions of sendmail and users should check with their vendors for a security patch, CERT said. Sendmail is the most commonly used MTA (mail transfer agent) and handles the majority of all Internet e-mail traffic.

Sendmail Inc. and the Sendmail Consortium urge users of their versions to upgrade to sendmail 8.12.9 or apply a patch, they said in a joint advisory Saturday. The Sendmail Consortium develops an open source version of sendmail that is distributed with both free and commercial operating systems. Sendmail Inc. sells a commercial product based on the open source sendmail software.

The problem affects all versions of Sendmail Pro, all versions of open source sendmail prior to 8.12.9, and several versions of Sendmail Switch and Sendmail for NT, according to CERT.

The e-mail address parser flaw is the second “critical” bug in sendmail announced and patched this month. The earlier vulnerability occurred because of an error in a function that checks whether addresses in the e-mail message header are valid. This could also allow an attacker to take over a sendmail server, experts said.

Some users have had it with sendmail, according to postings on the topic on “News for nerds” Web site Slashdot.org.

“This is the straw that breaks the camel’s back. I’m changing to another MTA,” writes one user. “Sendmail: The IIS of Open Source,” writes another, referring to Microsoft Corp.’s Internet Information Server (IIS) Web server software, which has had its share of security issues.

However, other forum postings criticize qmail and Postfix, two sendmail alternatives, and point out that this latest sendmail flaw is likely difficult to exploit.

CERT said it successfully exploited the flaw to knock the sendmail server offline and that it is possible to execute code on some systems by exploiting this flaw.

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now