[6842] in bugtraq
Re: about sendmail 8.8.8 HELO hole
daemon@ATHENA.MIT.EDU (Zach White)
Thu May 28 13:30:46 1998
Date: Tue, 26 May 1998 22:17:34 -0700
Reply-To: Zach White <zach@MAILHOST.CLIPPER.NET>
From: Zach White <zach@MAILHOST.CLIPPER.NET>
X-To: root@PNS.NETBG.COM
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To: <Pine.LNX.3.96.980522121734.11307A-100000@pns.netbg.com> from
Valentin Pavlov at "May 22, 98 12:36:54 pm"
Valentin Pavlov wrote:
> -----Original Message-----
> From: Micha=B3 Zalewski <lcamtuf@boss.staszic.waw.pl>
> To: info@rootshell.com <info@rootshell.com>
> Date: 10 stycznia 1998 12:28
> Subject: Sendmail 8.8.8 (qmail?) HELO hole.
>
>
> Here's a brief description of Sendmail (qmail) hole I found
> recently:
>
> When someone mailbombs you, or tries to send fakemail, spam, etc -
> sendmail normally attachs sender's host name and it's address
> to outgoing message:
*snip*
I just checked qmail to see if it was vunerable, and qmail 1.02 is
safe because it displays the host before the helo string (It also
displayed the complete helo string, about 2000 characters). Another
exploit in sendmail and still none for qmail. ;)
--
***** Zach White [/\] ClipperNet Internet Access Services *****
***** Finger zach@mailhost.clipper.net for public PGP key *****