출처 : http://www.sendmail.com/security/advisories/SA-200605-01.txt.asc
Topic: Deeply nested malformed MIME denial of service attack
Class: Remote Denial of Service
Severity: Low
Announced: 2006-06-14
09:00 PDT
Revised: 2006-06-16 09:00 PDT
Credits: Frank
Sheiness
Affects: Sendmail Switch 3.2.0
Sendmail Switch for Windows 3.1.3
and earlier
Sendmail Switch 3.1.8 and earlier
Intelligent Quarantine 3.0
(includes Switch)
Sendmail Advanced Message Store (SAMS) (includes
Switch)
Sendmail Sentrion 1.5.1 and earlier
Mailstream Gatekeeper
(includes Sentrion OS)
Mailstream Governor (includes Sentrion OS)
Sendmail
Pro all versions
Resolved: Sendmail Switch 3.2.2
Sendmail Switch for
Windows 3.1.4
Sendmail Switch 3.1.9
Sendmail Sentrion 1.5.3
For general information regarding Sendmail, Inc. Security
Advisories,
including descriptions of the fields above, other security
advisories,
and the following sections, please visit
<http://www.sendmail.com/security/>.
I. Background
Sendmail Switch and the Sendmail Sentrion appliances include the
sendmail
MTA which is used to route mail into and out from an
organization using SMTP.
The MTA supports MIME 8-bit to 7-bit
conversion when talking to remote MTAs
which do not support 8-bit MIME.
This conversion routine is also used to
enforce the MaxMimeHeaderLength
option which protects users from buffer
overflows in older versions of
mail user agents.
Note that the open source and vendor versions of the sendmail MTA
are also
affected but this advisory only covers the commercial
products. For the open
source version, please see the open source
URL in the Reference section
below. For third party vendor
versions, please contact your vendor.
II. Problem Description
During message delivery, certain deeply nested malformed MIME messages
can
cause the MIME 8-bit to 7-bit conversion routine to exhaust the
per-process
stack space memory available and cause that process to
abort. Depending on
system configuration, this may also cause a core
dump for that process to be
written to disk.
To the best of our knowledge, this type of attack is not currently in
use
and the problem was found through a report of an isolated and
unintentional
incident. That said, the information contained in this
advisory is now
generally known and there may be a higher likelihood of
occurrence.
Therefore, Sendmail recommends that you take immediate
action.
III. Impact
The process which exits abnormally is not the server process and will
not
cause your system to stop accepting connections, but there are two
problems
which can occur due to this bug:
1. If your system writes uniquely named core dump files per process,
there
is the potential for disk space to be filled with core dumps.
2. A deeply nested malformed MIME message in the queue will cause
queue
runs to abort when trying to process the message. This can
prevent
delivery attempts on other queued messages.
IV. Workaround
If you are unable to immediately install the patch described in
the
Solution section below or there is not a patch available for
your
version, you can protect your system by using one of these
workarounds:
1. The Sendmail Consortium is releasing an open source mail filter
for
UNIX systems which blocks messages that may trigger this problem.
For more information on this filter, please see the Sendmail
Knowledge
Base article referenced below.
2. If your operating system limits stack size, remove that limit
for
sendmail's startup. This will make the attack more difficult
to
accomplish, as it will require a very large message. Also, by
limiting
the maximum message size accepted by your server (via the
sendmail
MaxMessageSize option), you can eliminate the attack
completely.
To remove the stack size limit, use one of the following commands in
your
sendmail startup script (by placing the command in the startup
script, only
sendmail should be affected):
ulimit -s unlimited (sh, bash, ksh)
limit stacksize unlimited (csh, tcsh,
zsh)
For more information on adjusting stack size limits, please see
the
Sendmail Knowledge Base article referenced below.
3. Configure your MTA to avoid the negative impacts listed above:
a. Turn off core dumps for sendmail using one of the following
commands in
your sendmail startup script (by placing the command
in the startup script,
only sendmail should be affected):
ulimit -c 0 (sh, bash, ksh)
limit coredumpsize 0 (csh, tcsh, zsh)
For more information on turning off core dumps, please see the
Sendmail
Knowledge Base article referenced below.
b. To prevent queued jobs from being ignored, you can either:
* Enable the ForkEachJob option at the cost of lower queue run
performance
and potentially a high number of processes (one per
queued item), or
* Set QueueSortOrder to random, which will randomize the order
jobs are
processed. Note that with random queue sorting, the
bad message will still be
processed and the queue run aborted
every time, but at a different, random
spot.
For more information on changing queue run behavior, please see
the
Sendmail Knowledge Base article referenced below.
V. Solution
Sendmail, Inc. has released patches for Sendmail Switch versions 3.1
and
3.2, Sendmail Switch for Windows 3.1, and for Sendmail Sentrion
version 1.5.
Those patches are available to supported customers on
their download site
at:
https://www.sendmail.com/customerlogin/
If you are unable to use the download site or need the Switch 3.1.9
patch,
you can also download it from our ftp site at:
Refer to the README included with each patch for
installation
instructions. The available patches are:
MD5 (smswitch-patch-3.1.9-Linux.tar.gz) =
7d266b9b43d17daa3be3dbe7166ff9f9
MD5 (smswitch-patch-3.1.9-Solaris8.tar.Z) =
a62a0aef50c561e45a5402a0acd3639a
MD5 (smswitch-patch-3.2.2-Linux.tar.gz) =
3df9df0b99ed7dd427d056ed50f73765
MD5 (smswitch-patch-3.2.2-Solaris8.tar.Z) =
c65548178fc5eca4fcbe3bc0c28fb3e0
MD5 (smswitch-patch-3.1.4-Windows.zip) =
d863292580b89a704b0692a4d8a6e481
MD5 (SentriOS-1.5.3-896-897.tar) =
8950c0bcc6875d085e094be998454fff
Unsupported customers or those running older product versions
should
employ one of the workarounds listed above.
VI. References
Japanese Translation
--------------------
http://www.sendmail.com/jp/advisory/
SA-200605-01 Frequently Asked
Questions
---------------------------------------
http://www.sendmail.com/security/advisories/SA-200605-01/faq.shtml
Sendmail Knowledge Base Articles
--------------------------------
Using
malformed MIME workaround filter on Switch or Sentrion
https://www.sendmail.com/cfusion/CFIDE/kb_doc.cfm?kb_id=S10808
Changing stack size and core dump options on Switch/Sentrion
https://www.sendmail.com/cfusion/CFIDE/kb_doc.cfm?kb_id=S10805
Limiting maximum message size on Switch or Sentrion
https://www.sendmail.com/cfusion/CFIDE/kb_doc.cfm?kb_id=S10807
Changing queue run behavior on Switch or Sentrion
https://www.sendmail.com/cfusion/CFIDE/kb_doc.cfm?kb_id=S10806
Sendmail Open Source Information
--------------------------------
http://www.sendmail.org/releases/8.13.7.html
External Links
--------------
CERT: http://www.kb.cert.org/vuls/id/146718
CVE:
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1173
VII. Revision Details
2006-06-16 09:00 PDT: Replaced Switch 3.2.1 with Switch 3.2.2 and
Sentrion
1.5.2 with Sentrion 1.5.3 as the
previous patch versions contained a
regression
unrelated to the security fix.
관련 링크: http://www.sendmail.com/security/advisories/SA-200605-01.txt.asc
'Security' 카테고리의 다른 글
Stack-based buffer overflow in ProFTPD 1.3.0 and earlier (0) | 2006.12.07 |
---|---|
gzip package security issues (0) | 2006.11.14 |
PHP phpinfo() Array Validation Bug (0) | 2006.04.21 |
util-linux and mount packages fix security issue (0) | 2006.01.12 |
php security update (1) | 2005.07.13 |