Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 2 Nov 2000 18:09:12 +0300
From:      Vladimir Dubrovin <vlad@sandy.ru>
To:        Cy Schubert - ITSD Open Systems Group <Cy.Schubert@uumail.gov.bc.ca>
Cc:        freebsd-security@FreeBSD.ORG
Subject:   Re[2]: vulnerability in mail.local (fwd)
Message-ID:  <14381494372.20001102180912@sandy.ru>
In-Reply-To: <200011021428.eA2ESvl34243@cwsys.cwsent.com>
References:  <200011021428.eA2ESvl34243@cwsys.cwsent.com>

next in thread | previous in thread | raw e-mail | index | archive | help
Hello Cy Schubert - ITSD Open Systems Group,

02.11.00 17:28, you wrote: vulnerability in mail.local (fwd);

>> mail.local(8) is no longer installed as a set-user-id binary.

C> I would think that there is still a non-privileged user exploit.

Under  FreeBSD  mail.local  always  invoked  from  sendmail.  Sendmail
doesn't allow addresses like this:

Nov  2 17:54:07 adm sendmail[19467]: RAA19467: from=|/sbin/reboot@sandy.ru, size
=70, class=0, pri=30070, nrcpts=1, msgid=<200011021453.RAA19467@xxx.xxx.ru>
, proto=SMTP, relay=xxx.xxx.ru [192.168.1.40]
Nov  2 17:54:07 adm sendmail[19540]: RAA19467: to=vlad@sandy.ru, delay=00:00:40,
 xdelay=00:00:00, mailer=fastsmtp, relay=xxx.xxx.ru [192.168.1.5], stat=
Data format error                                                               
Nov  2 17:54:07 adm sendmail[19540]: RAA19467: RAA19540: DSN: Data format error 

all MUAs like "mail" use sendmail instead of mail.local even in case of local user.


-- 
   Vladimir Dubrovin                  Sandy, ISP
    Sandy CCd chief               Customers Care dept
  http://www.sandy.ru           Nizhny Novgorod, Russia
 
http://www.security.nnov.ru




To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?14381494372.20001102180912>