[37964] in bugtraq

home help back first fref pref prev next nref lref last post

Re: possible local exploit via sendmail with procmail on solaris

daemon@ATHENA.MIT.EDU (Jeff Damens)
Thu Dec 23 20:43:42 2004

Date: Wed, 22 Dec 2004 17:24:56 -0500 (EST)
Message-Id: <200412222224.iBMMOuXd021613@ebbets.poly.edu>
From: Jeff Damens <jdamens@ebbets.poly.edu>
To: mbarnes@compsci.wm.edu
Cc: bugtraq@securityfocus.com
In-reply-to: <20041221163003.G26699@star.compsci.wm.edu> (message from Michael
	Barnes on Tue, 21 Dec 2004 16:30:03 -0500)


Mike,

Sendmail is *supposed* to run the local mailer setuid as the
recipient, so procmail should have run as you.  I'm running sendmail
8.13.1 on solaris 7 & 8 and it does seem to setuid properly.  

Is it possible that procmail itself is setuid root and is invoking the
shell which is sourcing your .cshrc?  It would be interesting to see a
truss -f of sendmail doing a local delivery.

$h is the host as set from the 2nd part of the $# local mailer rule.
It probably isn't set in your sendmail rules for local users.  

Regards,

Jeff

----------------------------------------------------------------

Jeff Damens                     Unix Systems Administrator
Polytechnic University          jdamens@ebbets.poly.edu
6 Metrotech                     (718) 260-3492
Brooklyn, New York 11201

home help back first fref pref prev next nref lref last post