search menu icon-carat-right cmu-wordmark

CERT Coordination Center

IBM AIX sendmail configured as open mail relay by default

Vulnerability Note VU#814617

Original Release Date: 2003-06-17 | Last Revised: 2003-06-17

Overview

Sendmail shipped with IBM AIX is configured by default as an open mail relay. Unauthenticated, remote users can route mail through such a system.

Description

Sendmail is a widely used mail transfer agent (MTA) that is included with IBM AIX. According to IBM:

The default configuration files for sendmail enable three sendmail options which allow arbitrary users to route email via sendmail. The options are "promiscuous_relay", "accept_unresolvable_domains" and "accept_unqualified_senders".
In this configuration, sendmail accepts messages addressed from and to non-local email domains.

Impact

Any remote user can route mail through sendmail on a vulnerable IBM AIX system. This configuration is called an "open relay" and such systems are frequently abused to deliver unsolicited commercial email (UCE) or SPAM.

Solution

Modify sendmail Configuration
Configure sendmail not to accept messages addressed from and to foreign domains on behalf of unauthenticated users. IBM has released an advisory and updated configuration files for sendmail on AIX:

ftp://aix.software.ibm.com/aix/efixes/security/sendmail_3_mod.tar.Z
From the IBM advisory:

Note that this change should only be applied to systems using the default configuration files. Administrators who use customized configuration files will lose their customizations. The changes made by this modification will be lost if a migration install is done; it will be necessary to re-apply the change. This change will be made permanent in a future release of AIX.

Block or Restrict Access

Using a firewall or similar technology, block access to vulnerable AIX sendmail systems (SMTP 25/tcp) from untrusted networks such as the Internet.

Vendor Information

814617
 

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was reported by Tom Perrine of the San Diego Supercomputer Center.

This document was written by Art A Manion.

Other Information

CVE IDs: CVE-2003-0285
Severity Metric: 6.30
Date Public: 2003-05-13
Date First Published: 2003-06-17
Date Last Updated: 2003-06-17 22:43 UTC
Document Revision: 36

Sponsored by CISA.