search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Sendmail vulnerable to buffer overflow when DNS map is specified using TXT records

Vulnerability Note VU#814627

Original Release Date: 2002-06-28 | Last Revised: 2004-12-20

Overview

A remotely exploitable buffer overflow exists in Sendmail, versions 8.12.0 through 8.12.4. This vulnerability only exhibits itself if you have modified the configuration file to look up TXT records in DNS.

Description

The buffer overflow occurs in the portion of code that process responses from DNS servers. Please note that the Sendmail Consortium has indicated that this vulnerability is not present in the standard Sendmail distribution because the option that can trigger the exposure is not enabled. For more details, please see the Sendmail announcement.

Impact

A remote attacker may be able to execute arbitrary code with the privileges of the Sendmail daemon, typically root. Note that there is no known exploit for this vulnerability.

Solution

Upgrade to Sendmail 8.12.5 or apply the appropriate vendor-supplied patch.

Vendor Information

814627
 

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

The CERT/CC thanks Eric Allman and Gregory Shapiro for helping us construct this document.

This document was written by Ian A Finlay and Jeffrey Havrilla.

Other Information

CVE IDs: CVE-2002-0906
Severity Metric: 28.35
Date Public: 2002-06-25
Date First Published: 2002-06-28
Date Last Updated: 2004-12-20 16:24 UTC
Document Revision: 33

Sponsored by CISA.