CERT warns of Trojan horse in Sendmail package

An Internet hacker succeeded in implanting some copies of the source code for the Sendmail package with a Trojan horse, allowing intruders to access computers on which the popular mail-server was compiled and open computer networks to attack, security experts warned Tuesday.

The Trojan horse versions of the Sendmail package contain malicious code that creates a back door when the program is compiled from its source code, said the Computer Emergency Response Team Coordination Center (CERT/CC) in a statement.

CERT/CC urges Web sites that employ, redistribute or mirror the Sendmail package to immediately verify the integrity of their distribution.

Modified versions of the files sendmail.8.12.6.tar.z and sendmail.8.12.6.tar.gz began to appear in downloads from the FTP (file transfer protocol) server ftp.sendmail.org on or around Sept. 28, 2002, according to CERT/CC.

The Sendmail development team disabled FTP access to the server on Oct. 6.

Although CERT/CC said it doesn’t appear that copies downloaded via HTTP contained the Trojan horse, it encourages users who may have downloaded the source code via this protocol to verify software authenticity.

In particular, CERT/CC urges users to verify the cryptographic signatures of the packages. The Sendmail development team confirmed that Trojan horse copies failed signature checks.

Would you recommend this article?


Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.

Jim Love, Chief Content Officer, IT World Canada

Featured Download

Related Tech News

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Featured Reads