|
|
|
|
| |
Credit:
The information has been provided by ISS and Ido Kanner (SecuriTeam)
The original article can be found at: http://xforce.iss.net/xforce/alerts/id/216
The vendor advisory can be found at: http://www.sendmail.org/8.13.6.html
More information can be found in Gadi Evron's blog at SecuriTeam: http://blogs.securiteam.com/index.php/archives/363
|
| |
Vulnerable Systems:
* Sendmail version 8.13.5 and prior
* Sendmail version 8.12.10 and prior
Immune Systems:
* Sendmail version 8.13.6
Race condition DoS
Sendmail contains a signal race vulnerability when receiving and processing mail data from remote clients. Sendmail utilizes a signal handler for dealing with timeouts that is not async-safe and interruption of certain functions by this signal handler will cause static data elements to be left in an inconsistent state. These data elements can be used to write data to invalid parts of the stack (or heap in some scenarios), thus taking control of the vulnerable process.
In order to exploit this vulnerability, an attacker simply needs to be able to connect to sendmail SMTP server. This is a multi-shot exploit, meaning the attacker can attempt to exploit it an indefinite amount of times, since sendmail spawns a new process for each connected client.
Memory Jumps:
Unsafe usage of setjmp and longjmp functions allow attackers to redirect memory jumps and execute arbitrary code.
Integer Overflow:
When calculating the header size, an integer overflow may occur when too big header size is needed to allocate on unsigned integer causing an overflow and allow to execute arbitrary code.
CVE Information:
CVE-2006-0058
Vendor Status:
The vendor has issued a fix: http://www.sendmail.org/8.13.6.html
Patch for Sendmail version 8.13.5 available at: ftp://ftp.sendmail.org/pub/sendmail/8.13.5.p0
Patch for Sendmail version 8.12.11 available at: ftp://ftp.sendmail.org/pub/sendmail/8.12.11.p0
Disclosure Timeline:
Feb 14, 2006 Initial verndor notification
Mar 22, 2006 Initial alert release
|
|
|
|
|