March 22, 2006 12:51 PM PST
Sendmail flaw opens door to intruders
- Related Stories
Sendmail searches for antispam testersAugust 30, 2004
Microsoft touts 'Sender ID' to fight spam, scamsAugust 12, 2004
Security experts find open-source flawsSeptember 19, 2003
New Sendmail glitch makes two in MarchMarch 31, 2003
Sendmail flaw tests Homeland SecurityMarch 3, 2003
A serious flaw exists in certain versions of the popular Sendmail open-source and commercial e-mail software, but fixes are available, researchers said Wednesday.
The vulnerability, which was reported by Mark Dowd at Internet Security Systems, could allow a remote attacker to take control of an e-mail server. To do this, the intruder would send arbitrary code at carefully crafted time intervals to the SMTP mail server, according to alerts from security providers ISS and FrSirt.
An attack could interfere with or intercept mail delivery, permit the intruder to tamper with other programs and data on the vulnerable system, and potentially provide access to other systems on the affected machine's network.
The flaw relates to all Linux- and Unix-based versions of Sendmail 8 up to version 8.13.5, but not Microsoft Windows varieties of the open-source software, said the Sendmail Consortium, which oversees the project. Affected products put out by Sendmail Inc., which sells a commercial version, include Sendmail Switch, Sentrion and Advanced Message Server, according to a company alert.
Sendmail software delivers 70 percent of the world's e-mail messages, according to the consortium's estimates.
"Since SMTP is one of the few listening services allowed consistently through perimeter firewalls, we expect that many attackers will focus their efforts on developing techniques to exploit the vulnerability in order to gain entry into corporate and government networks," considered to be major Sendmail users, said Gunter Ollmann, director ISS's X-Force research team.
The threat analyst team at Symantec categorized the vulnerability as critical, meaning it has a significant chance of widespread exploitation.
A Sendmail Inc. representative said Wednesday that no exploits for the vulnerability have been reported, and noted that the flaw has been detected in the lab only.
However, the Sendmail Consortium strongly urged open-source users to upgrade to version 8.13.6 of the software, which contains a fix and is available through its Web site. Patches for two older versions of the software are also available for download, but the group discouraged that tactic, warning that the patches may not work properly.
For people who use the commercial software, a complete rundown of recommended actions is available through the Sendmail company advisory.
The incident isn't the first problem for the widely used software. Security researchers in 2003 identified a series of vulnerabilities.
14 commentsJoin the conversation! Add your comment