TUCoPS :: SCO :: smail4.htm

SCO OpenServer 5.0.6 sendmail buffer overflow
Vulnerability

    sendmail

Affected

    SCO OpenServer 5.0.6 upgrade from 5.0.x and 5.0.6 fresh install (sendmail 8.9.3)

Description

    Following is  based on  a Strategic  Reconnaissance Team  Security
    Advisory  (SRT2001-01).   SCO   OpenServer  5.0.6  ships  with   a
    previously  known  buggy  MMDF  package.   SCO  Security  Bulletin
    2000.06  states  "Recently  Network  Associates,  Inc.  issued   a
    SECURITY ADVISORY against all versions  of MMDF prior to the  beta
    release  2.44a-B4"  however  SCO  still  released OpenServer 5.0.6
    with version 2.43.3b of MMDF.  The sendmail 8.9.3 binary has  poor
    handling of command line arguments resulting in a buffer overflow.

        /opt/K/SCO/MMDF/2.43.3b/usr/lib/sendmail `perl -e 'print "A" x 3000'`
        Memory fault - core dumped

    This problem makes  it possible to  overwrite memory space  of the
    running process, and potentially  execute code with the  inherited
    privileges of the mmdf subsystem.

        uid=17(mmdf) gid=22(mmdf) groups=22(mmdf)

    Credit goes to Kevin Finisterre.

Solution

    - chmod -s /opt/K/SCO/MMDF/2.43.3b/usr/lib/sendmail
    - upgrade to a newer version of MMDF.
    - Vendor was notified on 03/22/01.  Vendor lab tests confirmed the
      issue.  Patch status is unknown.

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH