[6842] in bugtraq

home help back first fref pref prev next nref lref last post

Re: about sendmail 8.8.8 HELO hole

daemon@ATHENA.MIT.EDU (Zach White)
Thu May 28 13:30:46 1998

Date: 	Tue, 26 May 1998 22:17:34 -0700
Reply-To: Zach White <zach@MAILHOST.CLIPPER.NET>
From: Zach White <zach@MAILHOST.CLIPPER.NET>
X-To:         root@PNS.NETBG.COM
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  <Pine.LNX.3.96.980522121734.11307A-100000@pns.netbg.com> from
              Valentin Pavlov at "May 22, 98 12:36:54 pm"

Valentin Pavlov wrote:
> -----Original Message-----
> From: Micha=B3 Zalewski <lcamtuf@boss.staszic.waw.pl>
> To: info@rootshell.com <info@rootshell.com>
> Date: 10 stycznia 1998 12:28
> Subject: Sendmail 8.8.8 (qmail?) HELO hole.
>
>
> Here's a brief description of Sendmail (qmail) hole I found
> recently:
>
> When someone mailbombs you, or tries to send fakemail, spam, etc -
> sendmail normally attachs sender's host name and it's address
> to outgoing message:
*snip*

I just checked qmail to see if it was vunerable, and qmail 1.02 is
safe because it displays the host before the helo string (It also
displayed the complete helo string, about 2000 characters). Another
exploit in sendmail and still none for qmail. ;)

--
***** Zach White [/\] ClipperNet Internet Access Services *****
***** Finger zach@mailhost.clipper.net for public PGP key *****

home help back first fref pref prev next nref lref last post