[3496] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Remote exploit in sendmail 8.8.0

daemon@ATHENA.MIT.EDU (Alain Magloire)
Thu Oct 17 14:52:10 1996

Date: 	Thu, 17 Oct 1996 12:40:28 -0400
Reply-To: Alain Magloire <alain.magloire@rcsm.ee.mcgill.ca>
From: Alain Magloire <alain.magloire@rcsm.ee.mcgill.ca>
X-To:         nobody@cypherpunks.ca
To: Multiple recipients of list BUGTRAQ <BUGTRAQ@netspace.org>
In-Reply-To:  <199610170116.SAA04638@abraham.cs.berkeley.edu> from "John
              Anonymous MacDonald" at Oct 16, 96 09:34:10 pm

>
> There is a serious bug in the mime7to8() function of sendmail 8.8.0
> which allows anyone who can send you mail to execute arbitrary code as
> root on your machine.  I think mime7to8() only gets invoked if you set
> the undocumented "9" mailer flag.  However, this flag is set by
> default in the cf/mailer/local.m4 file that ships with sendmail
> 8.8.0.  Thus, if you are using an old V6 format configuration file
> from sendmail 8.7, you are probably safe, but if you generated a new
> V7 configuration file, you are probably vulnerable to this bug.
>

 From the READ_ME
MIME7TO8        If non-zero, include 7 to 8 bit MIME conversions.  Not yet
                implemented.

How about to simply recompile with
-DMIME7TO8=0

?

--
alain

home help back first fref pref prev next nref lref last post