search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Sendmail signal I/O race condition

Vulnerability Note VU#834865

Original Release Date: 2006-03-22 | Last Revised: 2011-07-22

Overview

A race condition in Sendmail may allow a remote attacker to execute arbitrary code.

Description

Sendmail

Sendmail is a widely used mail transfer agent (MTA).

Mail Transfer Agents (MTA)

MTAs are responsible for sending an receiving email messages over the internet. They are also referred to as mail servers or SMTP servers.

The Problem

Sendmail contains a race condition caused by the improper handling of asynchronous signals. In particular, by forcing SMTP server to have an I/O timeout at exactly the correct instant, the attacker may be able to execute arbitrary code with the privileges of the Sendmail process.

More information is available in the Sendmail version 8.13.6 release page and the Sendmail MTA Security Vulnerability Advisory.

This vulnerability occurred as a result of failing to comply with recommndations SIG32-C and SIG30-C of the CERT C Programming Language Secure Coding Standard.

Considerations

Versions of Sendmail prior to 8.13.6 are affected.

Impact

A remote, unauthenticated attacker could execute arbitrary code with the privileges of the Sendmail process. If Sendmail is running as root, the attacker could take complete control of an affected system.

Solution

Upgrade

This issue is corrected in Sendmail version 8.13.6.

Patches to correct this issue in Sendmail versions 8.12.11 and 8.13.5 are also available.


Refer to the Sendmail MTA Security Vulnerability Advisory for steps to reduce the impact of this vulnerability

Vendor Information

834865
 

View all 85 vendors View less vendors


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Thanks to Sendmail Inc. for reporting this vulnerability. Sendmail credits Internet Security Systems with providing information about this issue.

This document was written by Jeff Gennari.

Other Information

CVE IDs: CVE-2006-0058
Severity Metric: 19.88
Date Public: 2006-03-22
Date First Published: 2006-03-22
Date Last Updated: 2011-07-22 12:42 UTC
Document Revision: 92

Sponsored by CISA.