Vulnerability
sendmail
Affected
SCO OpenServer 5.0.6 upgrade from 5.0.x and 5.0.6 fresh install (sendmail 8.9.3)
Description
Following is based on a Strategic Reconnaissance Team Security
Advisory (SRT2001-01). SCO OpenServer 5.0.6 ships with a
previously known buggy MMDF package. SCO Security Bulletin
2000.06 states "Recently Network Associates, Inc. issued a
SECURITY ADVISORY against all versions of MMDF prior to the beta
release 2.44a-B4" however SCO still released OpenServer 5.0.6
with version 2.43.3b of MMDF. The sendmail 8.9.3 binary has poor
handling of command line arguments resulting in a buffer overflow.
/opt/K/SCO/MMDF/2.43.3b/usr/lib/sendmail `perl -e 'print "A" x 3000'`
Memory fault - core dumped
This problem makes it possible to overwrite memory space of the
running process, and potentially execute code with the inherited
privileges of the mmdf subsystem.
uid=17(mmdf) gid=22(mmdf) groups=22(mmdf)
Credit goes to Kevin Finisterre.
Solution
- chmod -s /opt/K/SCO/MMDF/2.43.3b/usr/lib/sendmail
- upgrade to a newer version of MMDF.
- Vendor was notified on 03/22/01. Vendor lab tests confirmed the
issue. Patch status is unknown.
TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2025 AOH