[2045] in bugtraq

home help back first fref pref prev next nref lref last post

Re: SM 8.6.12

daemon@ATHENA.MIT.EDU (Mark A. Fullmer)
Thu Jul 13 18:43:44 1995

Date:         Thu, 13 Jul 1995 10:02:02 -0400
Reply-To: maf@net.ohio-state.edu
From: "Mark A. Fullmer" <maf@net.ohio-state.edu>
X-To:         BUGTRAQ@CRIMELAB.COM
To: Multiple recipients of list BUGTRAQ <BUGTRAQ@CRIMELAB.COM>
In-Reply-To:  <199507080906.CAA15574@statler.csc.calpoly.edu> from "Nathan
              Lawson" at Jul 8, 95 02:06:53 am

Nathan Lawson writes:
>
>I would like to know if anyone has heard of the newest holes in sendmail 8.6.12.
>My details are sketchy, but once again, there is a remote, as well as local
>hole.
>
>Sendmail is convenient; convenience is evil!

A few weeks at the Cisco Networkers conference Bill Cheswick hinted at
a new found sendmail security problem in 8.6.12 which Eric had fixed in 8.7.

The 8.7 release notes contain:

    SECURITY: avoid denial-of-service attacks possible by destroying
        the alias database file by setting resource limits low.
        This involves adding two new compile-time options:
        HASSETRLIMIT (indicating that setrlimit(2) support is
        available) and HASULIMIT (indicating that ulimit(2) support
        is available -- the Release 3 form is used).  The former
        is assumed on BSD-based systems, the latter on System
        V-based systems.  Attack noted by Phil Brandenberger of
        Swarthmore University.

Is this the problem, or is it worse?  Eric?

--
mark
maf+@osu.edu

home help back first fref pref prev next nref lref last post