[6581] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Vulnerability in HP OpenMail

daemon@ATHENA.MIT.EDU (Richi Jennings)
Thu Apr 23 12:37:47 1998

Date: 	Thu, 23 Apr 1998 14:31:07 +0100
Reply-To: richi@HP.COM
From: Richi Jennings <richi@HP.COM>
X-To:         dej@INODE.ORG
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  <199804212235.SAA03972@ruff.inode.org>

dej wrote...

> The good news is that mail users have their own Unix UIDs on the server.
> The real problem is situations where the sysadmin has denied users regular
> login access to the mail server, possibly by putting "*" in the password
> field.  This is standard practice as a security measure.  If you have done
> this on your OpenMail server, then you may want to check your security
> measures carefully - your users can get the equivalent of shell whether you
> allow it or not.

This is a generic issue with any program that permits shell escapes.  It is
generally-accepted good practice to set up UNIX users with an
appropriately-configured restricted shell.  Relying on a '*' in the password
field is not sufficient--that only means "deny logon", not "deny arbitrary
shell command."

For even tighter security, the shell can be reset to /bin/true , but that would
not of course allow a user to call lp.

OpenMail administrators can also look into the OpenMail "print server"
functionality, particularly the documentation on the general.cfg setting
UAL_PRINT_SERVER_ONLY in the OpenMail Technical Guide.


Regards,

richi.
--
 Richi Jennings <richi@hp.com>        Phone: +44 (0)1344-365870 or HPT316-5870
 OpenMail Outbound & Technical        Pager: richi-beep@pwd.hp.com
 HP Communications Software Oper. UK  http://www.hp.com/go/openmail

home help back first fref pref prev next nref lref last post