Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 127324

Summary: Sendmail Remote Signal Handling Vulnerability
Product: Gentoo Security Reporter: psyprus <psyprus>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED DUPLICATE    
Severity: normal    
Priority: High    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: http://www.sendmail.org
Whiteboard:
Package list:
Runtime testing required: ---

Description psyprus 2006-03-23 09:12:27 UTC
SUMMARY

 <http://www.sendmail.com/> sendmail is "a powerful, efficient, and 
scalable Mail Transport Agent"

Improper timeout calculation, usage of memory jumps and integer overflows 
allow attackers to perfom a race condition DoS on sendmail, and may also 
execute arbitrary code.

DETAILS

Vulnerable Systems:
 * Sendmail version 8.13.5 and prior
 * Sendmail version 8.12.10 and prior

Immune Systems:
 * Sendmail version 8.13.6

Race condition DoS
Sendmail contains a signal race vulnerability when receiving and 
processing mail data from remote clients. Sendmail utilizes a signal 
handler for dealing with timeouts that is not async-safe and interruption 
of certain functions by this signal handler will cause static data 
elements to be left in an inconsistent state. These data elements can be 
used to write data to invalid parts of the stack (or heap in some 
scenarios), thus taking control of the vulnerable process.

In order to exploit this vulnerability, an attacker simply needs to be 
able to connect to sendmail SMTP server. This is a multi-shot exploit, 
meaning the attacker can attempt to exploit it an indefinite amount of 
times, since sendmail spawns a new process for each connected client.

Memory Jumps:
Unsafe usage of setjmp and longjmp functions allow attackers to redirect 
memory jumps and execute arbitrary code.

Integer Overflow:
When calculating the header size, an integer overflow may occur when too 
big header size is needed to allocate on unsigned integer causing an 
overflow and allow to execute arbitrary code.

CVE Information:
 <http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0058> 
CVE-2006-0058
Comment 1 psyprus 2006-03-23 09:16:03 UTC

*** This bug has been marked as a duplicate of 127234 ***