|
珞珈山水BBS →
电脑网络 →
BBS安装与维护 →
单文区文章阅读
|
| 单文区文章阅读 [返回] |
|---|
|
发信人: yuhuan.bbs@ytht.net (玻璃罩子~~压帮郎君~~天上掉宝), 信区: BBSDev 标 题: 二月二,龙抬头,走过路过别错过 发信站: YTHT (Tue Mar 4 09:05:27 2003) 转信站: WHU!news.tiaozhan.com!news.happynet.org!YTHT Sendmail is a widely used Mail Transport Agent (MTA) which is included in all Red Hat Linux distributions. During a code audit of Sendmail by ISS, a critical vulnerability was uncovered that affects unpatched versions of Sendmail prior to version 8.12.8. A remote attacker can send a carefully crafted email message which, when processed by sendmail, causes arbitrary code to be executed as root. We are advised that a proof-of-concept exploit is known to exist, but is not believed to be in the wild. Since this is a message-based vulnerability, MTAs other than Sendmail may pass on the carefully crafted message. This means that unpatched versions of Sendmail inside a network could still be at risk even if they do not accept external connections directly. In addition, the restricted shell (SMRSH) in Sendmail allows attackers to bypass the intended restrictions of smrsh by inserting additional commands after "||" sequences or "/" characters, which are not properly filtered or verified. A sucessful attack would allow an attacker who has a local account on a system which has explicitly enabled smrsh to execute arbitrary binaries as themselves by utilizing their .forward file. -- 我代表 一塌糊涂 BBS(ytht.net) 向社会各界诚征系统维护(业余劳动,没有工资待遇) 要求:1. 热爱祖国,热爱ytht,有成为bbs系统开发人员的远大理想 2. 在校学生,北大本科生优先考虑 3. 会 C 语言,熟悉 Linux 下 C 语言程序开发者优先考虑 4. 有 bbs 系统开发经验者请 mail 我 (yuhuan.bbs@ytht.net) 5. 没有 bbs 系统开发经验者也请 mail 我,地址见上 ※ 来源:.一塌糊涂 BBS ytht.net.[FROM: 162.105.213.171] |
| [返回单文区目录] |
|
|