[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: [cobalt-developers] *ALERT* UPDATED BID 3163 (URGENCY 6.58): Sendmail Debugger Arbitrary Code Execution Vulnerability (fwd)



>The attacker must  craft  in  architecture  specific  binary  code  the
>   commands (or 'shellcode') to be executed with  higher  privilege.
The
>   attacker must then run the program, using the '-d' flag to overwrite
a
>   function return address with the location of the supplied shellcode.
> 
> 
>   Restrict local access to trusted users only.
> 
>   Note that this problem is  not  remotely  exploitable.
>   Additionally, sendmail 8.12 will no  longer  uses  a  set-user-id
root
>   binary by default.
>   --------------------
>

Agreed its an issue. But looking at the above there shouldn't be a huge
issue unless your handing out shell accounts.

Curtis