The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


Sendmail MIME DoS vulnerability


<< Previous INDEX Search src / Print Next >>
Subject: Sendmail MIME DoS vulnerability
Date: Tue, 20 Jun 2006 15:57:32 -0700
Message-ID: <2BA50DCEB0119849BCDD0BEB7EC5F9630271F16B@CA1EXCLV02.adcorp.kla-tencor.com.>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: Sendmail MIME DoS vulnerability
thread-index: AcaUvOmdxNlspH2nQCOeEEnG3IMsnw==
From: "Jain, Siddhartha" <Siddhartha.Jain@kla-tencor.com.>
To: <bugtraq@securityfocus.com.>
X-OriginalArrivalTime: 20 Jun 2006 22:57:32.0786 (UTC) FILETIME=[EA090520:01C694BC]
X-Proofpoint-Spam-Reason: safe
X-Virus-Scanned: antivirus-gw at tyumen.ru

Hi,

I am trying to understand how the below mentioned sendmail
vulnerability.=20
http://www.sendmail.com/security/advisories/SA-200605-01.txt.asc

The description says that the DoS occurs when sendmail goes in a deeply
nested malformed MIME message and uses the MIME 8-bit to 7-bit
conversion function. Under what conditions would sendmail use the MIME
8-bit to 7-bit function? Only when the remote MTA doesn't understand
8-bit MIME, right?

That would mean that a malicious user would have to force the victim MTA
to relay the malformed mail to a MIME 7-bit-only MTA for the attack to
succeed. This probably means that open relays and ISP SMTP servers are
more vulnerable than purely incoming SMTP servers.

I am just trying to make sense of the advisory and the possible threat
of exploit.


Thanks,

- Siddhartha

<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру