[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
RE: [cobalt-developers] *ALERT* UPDATED BID 3163 (URGENCY 6.58): Sendmail Debugger Arbitrary Code Execution Vulnerability (fwd)
- Subject: RE: [cobalt-developers] *ALERT* UPDATED BID 3163 (URGENCY 6.58): Sendmail Debugger Arbitrary Code Execution Vulnerability (fwd)
- From: "Curtis Ross" <Curtis_Ross@xxxxxx>
- Date: Thu Aug 23 03:22:57 2001
- List-id: Discussion Forum for developers on Sun Cobalt Networks products <cobalt-developers.list.cobalt.com>
>The attacker must craft in architecture specific binary code the
> commands (or 'shellcode') to be executed with higher privilege.
The
> attacker must then run the program, using the '-d' flag to overwrite
a
> function return address with the location of the supplied shellcode.
>
>
> Restrict local access to trusted users only.
>
> Note that this problem is not remotely exploitable.
> Additionally, sendmail 8.12 will no longer uses a set-user-id
root
> binary by default.
> --------------------
>
Agreed its an issue. But looking at the above there shouldn't be a huge
issue unless your handing out shell accounts.
Curtis