[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
RE: [cobalt-developers] *ALERT* UPDATED BID 3163 (URGENCY 6.58): Sendmail Debugger Arbitrary Code Execution Vulnerability (fwd)
- Subject: RE: [cobalt-developers] *ALERT* UPDATED BID 3163 (URGENCY 6.58): Sendmail Debugger Arbitrary Code Execution Vulnerability (fwd)
 
- From: "Curtis Ross" <Curtis_Ross@xxxxxx>
 
- Date: Thu Aug 23 03:22:57 2001
 
- List-id: Discussion Forum for developers on Sun Cobalt Networks products <cobalt-developers.list.cobalt.com>
 
>The attacker must  craft  in  architecture  specific  binary  code  the
>   commands (or 'shellcode') to be executed with  higher  privilege.
The
>   attacker must then run the program, using the '-d' flag to overwrite
a
>   function return address with the location of the supplied shellcode.
> 
> 
>   Restrict local access to trusted users only.
> 
>   Note that this problem is  not  remotely  exploitable.
>   Additionally, sendmail 8.12 will no  longer  uses  a  set-user-id
root
>   binary by default.
>   --------------------
>
Agreed its an issue. But looking at the above there shouldn't be a huge
issue unless your handing out shell accounts.
Curtis