Skip to content
Tips for Tech

Tech Alert Briefing for 3/3/2003

Critical Vulnerability Discovered in Sendmail

The Department of Homeland Security (DHS) and the National Infrastructure Protection Center (NIPC) are both issuing an advisory to heighten awareness of the recently discovered Remote Sendmail Header Processing Vulnerability. Since many financial institutions run sendmail as their default messaging service under Unix or LINUX operating systems, system administrators are encouraged to review their software configurations for sendmail to ensure that the latest releases and patches are in place.

The Remote Sendmail Header Processing Vulnerability allows local and remote users to gain almost complete control of a vulnerable Sendmail server. Attackers gain the ability to execute privileged commands using super-user (root) access/control. This vulnerability can be exploited through a simple e-mail message containing malicious code. Sendmail is the most commonly used Mail Transfer Agent and processes an estimated 50 to 75 percent of all Internet e-mail traffic.The newly discovered vulnerabilty could allow an attacker to install malicious code, run destructive programs and modify or delete files.

Additionally, attackers may gain access to other systemsthru a compromised Sendmail server, depending on local configurations. Sendmail versions 5.2 up to 8.12.8 are known to be vulnerable at this time.

Due to the seriousness of this vulnerability, the NIPC is stronglyrecommending that system administrators who employ Sendmail take thisopportunity to review the security of their Sendmail software and toeither upgrade to Sendmail 8.12.8 or apply the appropriate patch forolder versions as soon as possible.

Patches for the vulnerability are available from Sendmail, from ISS whodiscovered the vulnerability and from vendors whose applicationsincorporate Sendmail code.Check with your vendor for updates.

The primary distribution site for Sendmail is: http://www.sendmail.org

Patches and information are also available from the following sites: The ISS Download center http://www.iss.net/download andCommon Vulnerabilities and Exposure (CVE) Project http://CVE.mitre.org

The SANS institute is offering a special webinar to discuss the vulnerability featuring one of the ISS researchers who made the initial discovery.



Previous Tech Alerts:
02/06/03Microsoft Releases Cummulative Patch for Internet Explorer Flaws It Lists as Critical
01/26/03The Importance of Applying Patches
01/23/03Microsoft and SUN release slew of Patches
01/14/03New Worms Spreading through Email
12/09/02Microsoft Issues Updated Cumulative Patch for IE
11/13/02New e-greeting tactics pose serious threat
11/01/02Critical patch released for Windows 2000, Windows XP
10/21/02Microsoft Fixes Vulnerabilities: Releases Patches for SQL, Word and Excel
10/03/02Bugbear Worm Gains Strength
10/02/02Top 20 List of Internet Security Vulnerabilities Released
09/02/02Microsoft Warns SysAdmins To Immediately Patch Identity Spoofing Flaw
08/21/02Microsoft releases patch to fix "critical" vulnerability inWindows 2000 systems that allow unprivileged users to logonto them interactively
08/09/02 Is Confidential Bank Information Walking Out Your Door?
07/30/02 Microsoft Continues to Patch Flawed Software
07/23/02 CERT advisory on PHP
07/15/02 Outlook Users Employing PGP Encryption Program Vulnerable to Hacking
07/11/02 Researchers Report Serious Flaw in IE
06/27/02 Microsoft Releases Critical Patch for Windows Media Player
06/18/02 CERT Warns of Critical Vulnerabilty in Apache Web Server
06/12/02 Sports Fans Beware: World Cup Virus Bounces Around the Net
06/07/02 Dead Man Tell No Passwords
05/31/02 Microsoft Issues Critical Warning Regarding Exchange Server
05/22/02 Microsoft SQL Spida Worm Slows Network Traffic
05/15/02 Virus Hoax 'JDBGMGR.EXE' Spreading Rapidly Thoughout Net
04/25/02 Klez Worm Reels in Banks with its Bait
04/11/02 Ten New Vulnerabilities Discovered in Microsoft IIS Server
04/09/02 New Virus Hoax Circulating Around Net
03/22/02 MyLife.B Virus Makes Its Way Around the Net
03/21/02 Microsoft Updates Its Warning on Critical Windows Vulnerability
03/14/02 New Virus (W32/Fbound-C) Spreading Rapidly in the Wild
03/08/02 Unauthorized E-Mail Scam Attempts to Steer Unwitting Customers to Fraudulent Bank Web Site
03/06/02 Klez-E Worm and W32.Gibe Virus Warnings
03/01/02 CERT Issues Warning on PHP Scripting Language Flaw
02/27/02 CERT Issues Warning on Internet Explorer and Outlook Flaw
02/22/02 SNMP Patches and Detection Tools Available
02/20/02 Email Address Belonging to Legitimate Security Site Hijacked to Deliver Dangerous Yarner Worm
02/15/02 Mass Mailing Email Worm Compromises Word 2000 Security Settings
02/13/02 SNMP VULNERABILITY
02/07/02 Bloodhound Mass Mailing Worm and Managing Risks in Wireless Networks
02/04/02 Microsoft Issues Collection of Security Fixes for Windows 2000
01/31/02 Copycat Virus Unleashed
01/30/02 Netscape Browser Vulnerable to Cookie Theft
01/28/02 "My Party" Mass Mailing Worm
01/18/02 IT Contingency Planning Guide, Information Security Checklist and Solaris Vulnerability
01/15/02 Trojan.StartPage Alters Web Browsers
01/12/02 New Internet Worm Gigger Masquerades as Microsoft Outlook Upgrade
01/08/02 Microsoft Universal Plug and Play Vulnerability
12/20/01 Holiday Themed Computer Virus Unleashed

First published on 03/02/2003

Briefing type: 

Banker Tools View All

A collection of useful resources for various areas of the bank which have been developed by members of the BankersOnline staff or have been created and contributed by users of the BankersOnline site.

Banker Tools

Penalties View All

Search Briefings

Briefing Archives