19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 3.11 Improper configuration of sendmail<br />

Errors in the configuration or software of sendmail have repeatedly led to<br />

security leaks in the affected <strong>IT</strong> systems in the past (typically: Internet worm).<br />

Example:<br />

Through various publications it has become known that it is possible to obtain<br />

user IDs and group IDs which are set with the options u and g (normally<br />

daemon). To do this a pipe has to be indicated in the address fiels (From:) so<br />

that the mail is sent back. In the mail itself an error message has to be<br />

generated. <strong>The</strong>refore, if you send an E mail containing<br />

cp/bin/sh/tmp/sh<br />

chmod oug + rsx/tmp/sh<br />

to an unknown recipient and use '/bin/sh' as the sender address, that message<br />

will be returned as undeliverable which, in this case, is equivalent to the<br />

execution of a small shell-script. By means of this script, a shell with a set<br />

suid bit will be generated which has the user and group ID defined in<br />

sendmail.cf.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!