Provided by Aanval (Snort & Syslog Intrusion Detection and Correlation Engine) www.aanval.com
--
| GEN:SID | 1:664 |
| Message | SMTP RCPT TO decode attempt |
| Summary | This event is generated when maliciously formatted "rcpt to" text is supplied to Sendmail. |
| Impact | Attempted administrator access. A successful attack can allow remote execution of commands with root privleges. |
| Detailed Information | A vulnerability exists in older versions of Sendmail that incorrectly parses message headers. This can allow a malicious user to execute arbitrary commands as root. |
| Affected Systems | Sendmail versions prior to 8.6.10 and any version based on 5.x. |
| Attack Scenarios | An attacker can craft a malicious mail header that executes a command. |
| Ease of Attack | Easy. Use a maliciously formatted header. |
| Corrective Action | Upgrade to version 8.6.10 or higher of Sendmail. |
| Additional References | Bugtraq: http://www.securityfocus.com/bid/2308 CVE: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0203 |
| Rule References | arachnids: 121 bugtraq: 2308 cve: 1999-0203 |
--
DID:883848
--
http://www.aanval.com/