Yet another snigger at s**dmail

Página superior
Eliminar este mensaje
Responder a este mensaje
Autor: Nick Waterman
Fecha:  
A: exim-users
Asunto: Yet another snigger at s**dmail
You've got to laugh, haven't you? This one sounds like you don't even
need to write perverse software to connect to mailhosts, you just need
to construct a particularly clever email, then spam as many people as
you want with it and wait for the results.

> From: CERT Advisory <cert-advisory@???>
> Subject: CERT Advisory CA-97.05 - Vulnerability in Sendmail 8.8.3 and 8.8.4
>
> Topic: MIME Conversion Buffer Overflow in Sendmail Versions 8.8.3 and 8.8.4
>
> The CERT Coordination Center has received reports of a vulnerability in
> sendmail versions 8.8.3 and 8.8.4. By sending a carefully crafted email
> message to a system running a vulnerable version of sendmail, intruders
> may be able to force sendmail to execute arbitrary commands with root
> privileges.

[blah]
> In most cases, the MIME conversion of email is done on final delivery;
> that is, to the local mailbox or a program. Therefore, this
> vulnerability may be exploited on systems despite firewalls and other
> network boundary protective measures.


Exim, we salute you once more. I wonder if we'll ever see a CERT
advisory about Exim?

--
Nick Waterman, Network Manager, Cimio Ltd.
nick@??? nick@??? G7RZQ @ GB7DEO.#32.GBR.EU
http://www.cimio.co.uk/~nick/ #include <disclaimer> Team *AMIGA*!
Excellent day for drinking heavily. Spike office water cooler.