Rapid7 Vulnerability & Exploit Database

CESA-2002:259: sendmail security update

Back to Search

CESA-2002:259: sendmail security update

Severity
5
CVSS
(AV:L/AC:L/Au:N/C:P/I:P/A:P)
Published
10/11/2002
Created
07/25/2018
Added
03/12/2010
Modified
07/04/2017

Description

The sendmail packages shipped with CentOS Linux Advanced Server have a security bug if sendmail is configured to use smrsh. This security errata release fixes the problem. [Updated 06 Feb 2003] Added fixed packages for Advanced Workstation 2.1

SMRSH (the SendMail Restricted SHell) is a /bin/sh replacement for Sendmail. It provides the ability to limit the set of executable programs available to Sendmail. A bug in the version of smrsh packaged as part of Sendmail 8.12.6 and 8.11.6 allows attackers to bypass shrsh's intended restrictions. This can be done by inserting additional commands after "||" or "/" characters, which are not properly filtered or verified. A sucessful attack would allow an attacker who has a local account on a system to execute arbitrary binaries as themselves by utilizing their .forward file. Because sendmail as shipped with CentOS Linux Advanced Server is not configured to use smrsh, this issue only affects users who have customized their sendmail configuration to use smrsh. Users who have configured sendmail to use smrsh should update to these errata packages which contain a backported security fix, and are therefore not vulnerable to this issue.

Solution(s)

  • centos-upgrade-sendmail
  • centos-upgrade-sendmail-cf
  • centos-upgrade-sendmail-devel
  • centos-upgrade-sendmail-doc

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;