search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Sendmail prescan() buffer overflow vulnerability

Vulnerability Note VU#784980

Original Release Date: 2003-09-17 | Last Revised: 2003-09-29

Overview

Sendmail contains a buffer overflow vulnerability in code that parses email addresses. This vulnerability could allow a remote attacker to execute arbitrary code or cause a denial of service on a vulnerable system.

Description

Sendmail is a widely used mail transfer agent (MTA). There is a buffer overflow vulnerability in code that parses email addresses.

When processing email messages, sendmail creates tokens from address elements (user, host, domain). The code that performs this function (prescan() in parseaddr.c) contains a vulnerability that could allow a remote attacker to overwrite memory structures and execute arbitary code. The attacker could exploit this vulnerability using an email message with a specially crafted address. Such a message could be passed through MTAs that are not vulnerable.

Further information is available in a message by Michal Zalewski.

This is a different vulnerability than the one described in CA-2003-12/VU#897604.

Impact

A remote attacker could execute arbitrary code with the privileges of the Sendmail process, typically root. The attacker may also be able to cause a denial of service.

Solution

Upgrade or Patch
Upgrade or apply a patch as specified by your vendor. Sendmail has released version 8.12.10 and a patch that resolve this issue.


Enable RunAsUser

Consider setting the RunAsUser option to reduce the impact of this vulnerability. It is typically considered to be a good security practice to limit the privileges of applications and services whenever possible.

Vendor Information

784980
 

View all 63 vendors View less vendors


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was discovered by Michal Zalewski.

This document was written by Art Manion.

Other Information

CVE IDs: CVE-2003-0694
CERT Advisory: CA-2003-25
Severity Metric: 36.72
Date Public: 2003-09-17
Date First Published: 2003-09-17
Date Last Updated: 2003-09-29 22:39 UTC
Document Revision: 20

Sponsored by CISA.