Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Major Internet vulnerability discovered in e-mail protocol
Computerworld ^ | March 3, 2003 | Dan Verton

Posted on 03/03/2003 2:44:44 PM PST by Dont Mention the War

Major Internet vulnerability discovered in e-mail protocol

By DAN VERTON
MARCH 03, 2003

The Department of Homeland Security (DHS) has been working in secret for more than two weeks with the private sector to fix a major Internet vulnerability that could have had disastrous consequences for millions of businesses and the U.S. military.

Since Feb. 14, the DHS and the White House Office of Cyberspace Security have been working with Atlanta-based Internet Security Systems (ISS) to alert IT vendors and the business community about a major buffer overflow vulnerability in the sendmail mail transfer agent (MTA).

Sendmail is the most common MTA and handles between 50% and 75% of all Internet e-mail traffic. Versions of the software, from 5.79 to 8.12.7, are vulnerable, according to an ISS alert issued publicly today.

According to sources familiar with the investigation, ISS discovered the vulnerability on Feb. 13. It then contacted the homeland security officials, who began the process of alerting IT vendors that distribute sendmail, including Sun Microsystems Inc., IBM, Hewlett-Packard Co. and Silicon Graphics Inc., as well as the Sendmail Consortium, the organization that develops the open-source version of sendmail that is distributed with both free and commercial operating systems. The seriousness of the vulnerability, coupled with the fact that the hacker community wasn't yet aware of it, caused the government and ISS to decide it was better to keep the news under wraps until patches could be developed.

The Sendmail Consortium is urging all users to either upgrade to Sendmail 8.12.8 or apply a patch for 8.12.x (or for older versions). Updates can be downloaded from ftp.sendmail.org or any of its mirrors, or from the Sendmail Consortium's site. The consortium said patch users should remember to check the PGP signatures of any patches or releases obtained. It also suggested that those running the open-source version of sendmail check with their vendors for a patch.

Sendmail Inc., the commercial provider of the sendmail MTA, is providing a binary patch for its commercial customers that can be downloaded from Sendmail Inc.'s Web site at: http://www.sendmail.com/.

"The Remote Sendmail Header Processing Vulnerability allows local and remote users to gain almost complete control of a vulnerable Sendmail server," according to an alert prepared today by the DHS. "Attackers gain the ability to execute privileged commands using super-user (root) access/control. This vulnerability can be exploited through a simple e-mail message containing malicious code.

"System administrators should be aware that many Sendmail servers are not typically shielded by perimeter defense applications" such as firewalls, warned the DHS alert, which hadn't yet been made publicly available as of midafternoon. "A successful attacker could install malicious code, run destructive programs and modify or delete files."

Additionally, attackers could gain access to other systems through a compromised sendmail server, depending on local configurations, according to the DHS warning.

According to the ISS, the sendmail remote vulnerability occurs when processing and evaluating header fields in e-mail collected during a Simple Mail Transfer Protocol transaction. Specifically, when fields are encountered that contain addresses or lists of addresses (such as the "From" field, "To" field and "CC" field), sendmail attempts to semantically evaluate whether the supplied address (or list of addresses) is valid. This is accomplished using the crackaddr() function, which is located in the headers.c file in the Sendmail source tree.

A static buffer is used to store data that has been processed. Sendmail detects when this buffer becomes full and stops adding characters, although it continues processing. Sendmail implements several security checks to ensure that characters are parsed correctly. One such security check is flawed, making it possible for a remote attacker to send an e-mail with a specially crafted address field that triggers a buffer overflow.

"Sendmail's vulnerability offers a legitimate test [of the new DHS and its ability to work with the private sector] because sendmail handles a large amount of Internet mail traffic and is installed on at least 1.5 million Internet-connected systems," said an alert from the SANS Institute in Bethesda, Md., that was obtained by Computerworld today. "More than half of the large ISPs and Fortune 500 companies use sendmail, as do tens of thousands of other organizations. A security hole in sendmail affects a lot of people and demands their immediate attention."

Of particular concern to the White House was the potential vulnerability of the U.S. military, which is poised to begin offensive military operations in Iraq and is simultaneously facing the possibility of conflict on the Korean peninsula. As a result, early versions of available patches were distributed first to U.S. military organizations on Feb. 25 and 26, according to the SANS alert. The advance military alert was followed last Thursday and Friday with alerts to various government organizations in the U.S. and around the world, including the Information Sharing and Analysis Centers (ISAC).

"Some of the large commercial vendors developed patches very quickly. But the delayed notice to smaller sources of sendmail distributions and limited resources at those organizations meant that not all the patches would be ready by early in the week of February 23," according to the SANS analysis of the public-private response effort.

A senior-level coordination group of government and private-sector experts then decided, based on a review of cyber intelligence from various hacker discussion boards and a series of sensors deployed around the world by ISS, that it was safe to wait until all the patches were available before alerting the general business and Internet community to the vulnerability.

Beginning today at 10 a.m. EST, alerts began flowing to federal agencies from the Federal Computer Incident Response Center (FedCIRC) and, from the ISACs, to companies responsible for critical infrastructure. At noon EST today, ISS released its own advisory, followed by a general alert from the CERT Coordination Center at Carnegie Mellon University in Pittsburgh.


TOPICS: Crime/Corruption; Extended News; Government; News/Current Events; Technical
KEYWORDS: cybersecurity; linux; sendmail; sunmicrosystems; unix

1 posted on 03/03/2003 2:44:45 PM PST by Dont Mention the War
[ Post Reply | Private Reply | View Replies]

To: Dont Mention the War
People still use sendmail? Ick. Qmail, for starters, is a much nicer and vastly more secure alternative.
2 posted on 03/03/2003 2:49:06 PM PST by tortoise
[ Post Reply | Private Reply | To 1 | View Replies]

To: Dont Mention the War
Sendmail is so speedy and reliable that it accounts for most of the worlds email traffic, in one form or another. It is my understanding a patch has been developed and should be applied to any system in question. Sendmail has been a reliable solution for many many many years, and I don't think that will change.
3 posted on 03/03/2003 2:52:41 PM PST by rs79bm
[ Post Reply | Private Reply | To 1 | View Replies]

To: rs79bm
Wow, I am glad it was only sendmail.

For a minute there I thought it was echelon that had a security hole.

snooker
4 posted on 03/03/2003 2:57:57 PM PST by snooker
[ Post Reply | Private Reply | To 3 | View Replies]

To: snooker
Don't get the ACLU too excited.
5 posted on 03/03/2003 3:46:21 PM PST by rs79bm
[ Post Reply | Private Reply | To 4 | View Replies]

To: Dont Mention the War
LOL
Sendmail has vulnerabilities - nawwww </dripping sarcasm>

Any mail admin that knows how to spell security does not use Sendmail.
6 posted on 03/03/2003 4:01:53 PM PST by taxcontrol
[ Post Reply | Private Reply | To 1 | View Replies]

To: Dont Mention the War
I wonder how many Freepers really understand what a buffer overflow is, and how you would go about exploiting it. Creating a machine language egg may not be a common skill in these parts.

I think one of the L0pht guys had a good tutorial on this arcane art, but it was pretty technical.
7 posted on 03/03/2003 4:03:42 PM PST by proxy_user
[ Post Reply | Private Reply | To 1 | View Replies]

Comment #8 Removed by Moderator

To: taxcontrol
Any mail admin that knows how to spell security does not use Sendmail.

"Sendmail is the most common MTA and handles between 50% and 75% of all Internet e-mail traffic."

Yep, that pretty much accords with my observations, that about 50-75% of admins really don't know what the hell they're doing ;)

9 posted on 03/03/2003 5:13:33 PM PST by general_re (Friends help you move. Real friends help you move bodies.)
[ Post Reply | Private Reply | To 6 | View Replies]

To: proxy_user
I think one of the L0pht guys had a good tutorial on this arcane art, but it was pretty technical.

Ever read 2600? Great little quarterly. :-)

10 posted on 03/03/2003 5:19:05 PM PST by RadioAstronomer
[ Post Reply | Private Reply | To 7 | View Replies]

To: Dont Mention the War
Of particular concern to the White House was the potential vulnerability of the U.S. military, which is poised to begin offensive military operations in Iraq and is simultaneously facing the possibility of conflict on the Korean peninsula. As a result, early versions of available patches were distributed first to U.S. military organizations on Feb. 25 and 26, according to the SANS alert. The advance military alert was followed last Thursday and Friday with alerts to various government organizations in the U.S. and around the world, including the Information Sharing and Analysis Centers (ISAC).

Perhaps this was another reason for delaying action in Iraq...

11 posted on 03/04/2003 5:16:28 AM PST by DouglasKC
[ Post Reply | Private Reply | To 1 | View Replies]

To: proxy_user
I don't think writing a machine language egg is a common skill in any parts.
12 posted on 03/04/2003 5:37:12 AM PST by ko_kyi
[ Post Reply | Private Reply | To 7 | View Replies]

Comment #13 Removed by Moderator

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson