[2084] in bugtraq

home help back first fref pref prev next nref lref last post

Re: SECURITY HOLE: FormMail

daemon@ATHENA.MIT.EDU (Neil Woods)
Sat Aug 5 15:30:36 1995

Date:         Sat, 5 Aug 1995 10:26:35 +0100
Reply-To: Bugtraq List <BUGTRAQ@CRIMELAB.COM>
From: Neil Woods <neil@legless.demon.co.uk>
X-To:         BUGTRAQ@CRIMELAB.COM
To: Multiple recipients of list BUGTRAQ <BUGTRAQ@CRIMELAB.COM>
In-Reply-To:  <199508042344.QAA20408@Csli.Stanford.EDU> from "Christian
              Wettergren" at Aug 4, 95 04:44:05 pm

>
> | Just to be helpful, the way to do it more safely, without massive
> | need for checking is to build a complete mail message, including
> | header, and hand that to "sendmail -t" which then reads the recipient
> | information out of the constructed header.  [Sendmail should of course
> | be an invocation of smail or pp, not the BSD program of that name,
> | given the history of problems that has had]
>
> I suspect this still wont take care of emails to pipes or files,
> i.e  <|/bin/sh> or </.rhosts>, it is a legitimate, albeit unexpected,
> mail-command going to sendmail. So unless these two mode are totally
> stripped out of the sendmail, there will exist a vulnerability there,
> wont it?
>

No current version of sendmail (v8.*, any vendor supplied version) will
allow mailing directly to programs or files.  In order to deliver mail to
a program or file, it must be indirect (ie. alias expansion, or from a
users .forward file).

Cheers,

Neil
--
Let the Mystery Be, So Watcha Want, Longing In Their Hearts, Hate My Way,
M-Bike, Safari, Uncle June and Aunt Kiyoti, Daisy Dead Petals, Tuff Gnarl.

     ...like a badger with an afro throwing sparklers at the Pope...

home help back first fref pref prev next nref lref last post