[17469] in bugtraq

home help back first fref pref prev next nref lref last post

Re: vulnerability in mail.local

daemon@ATHENA.MIT.EDU (Neil W Rickert)
Thu Nov 2 13:40:21 2000

Message-Id:  <24916.973127870@euclid.cs.niu.edu>
Date:         Wed, 1 Nov 2000 19:17:50 -0600
Reply-To: Neil W Rickert <rickert@CS.NIU.EDU>
From: Neil W Rickert <rickert@CS.NIU.EDU>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  Message from gregory duchemin <c3rb3r@HOTMAIL.COM> of "Wed, 01
              Nov 2000 18:57:10 GMT." <F63BZTW5k1Ed28kIN4M00005711@hotmail.com>

gregory duchemin <c3rb3r@HOTMAIL.COM> wrote:

>mail.local is a little setuid root prog designed, like its name suggest, for
>local mail delivering.
>Used with the -l option, we have an interactive mode in lmtp protocol (
>simplified smtp for local mail delivery only )
>A weakness exists in the 'mail from' field that allow any local user to
>insert a piped shell command that may be executed
>by the recipient when he does a reply with the  mail command. A little
>social engineering skill should help to root the boxe.
>Finally, mail.local shouldn't allow such escape chars even in the mail from
>field and the command mail shouldn't allow such
>a reply through a pipe.

>A space char in the command will finish the string, so either u use a single
>command like '|reboot' or use a comma that should
>be converted in space by mail.
>eg: '|shutdown,now'

>Linux 2.4.0 beta Caldera that was freely distributed during the defcon 00 is
>vulnerable to this pb.

>That looks like the old sendmail bugs

It is quite a stretch to call this a "mail.local" bug.

(1)  A well behaved mail program should reply to the address in the
     "From:" header, rather than that on the unix "From " line that
     separates mailboxes.

(2)  The ability to put such addresses with pipes on the "From:"
     header is derived from the RFCs that define the mail system.

(3)  On a system using sendmail, a recipient address that specifies a
     program would not be accepted by sendmail.  So this "bug" (if it
     is a bug), is due the mailer program used for replies executing
     the program directly.  The ucb 'Mail' program, and its near
     cousin 'mailx' will execute programs directly if given as
     addresses.  I have not tested whether they do so when invoked by
     root.

     If this can cause a problem, the bug is surely in the behavior
     of programs such as 'Mail' or 'mailx' which execute pipes given
     as addresses.

(4)  On a well managed system, there should be an alias for 'root',
     so that mail to root is read by a non-root user.  Triggering
     this "bug" assumes that root will blindly reply to a message
     without examining the address to which the reply is being sent.

     While that could happen, it could also happen that root has '.'
     on the path, and carelessly executes a trojan.

In short, I don't believe there is any significant new bug here.  At
most there is one more method that an incompetent system
administrator might be conned into doing something foolish.
And in any case, 'mail.local' is exonerated.

 -NWR

home help back first fref pref prev next nref lref last post