Lucene search

K
certCERTVU:814617
HistoryJun 17, 2003 - 12:00 a.m.

IBM AIX sendmail configured as open mail relay by default

2003-06-1700:00:00
www.kb.cert.org
174

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.007 Low

EPSS

Percentile

79.7%

Overview

Sendmail shipped with IBM AIX is configured by default as an open mail relay. Unauthenticated, remote users can route mail through such a system.

Description

Sendmail is a widely used mail transfer agent (MTA) that is included with IBM AIX. According to IBM:

The default configuration files for sendmail enable three sendmail options which allow arbitrary users to route email via sendmail. The options are “promiscuous_relay”, “accept_unresolvable_domains” and “accept_unqualified_senders”.
In this configuration, sendmail accepts messages addressed from and to non-local email domains.


Impact

Any remote user can route mail through sendmail on a vulnerable IBM AIX system. This configuration is called an “open relay” and such systems are frequently abused to deliver unsolicited commercial email (UCE) or SPAM.


Solution

Modify sendmail Configuration
Configure sendmail not to accept messages addressed from and to foreign domains on behalf of unauthenticated users. IBM has released an advisory and updated configuration files for sendmail on AIX:

<ftp://aix.software.ibm.com/aix/efixes/security/sendmail_3_mod.tar.Z&gt;
From the IBM advisory:

Note that this change should only be applied to systems using the default configuration files. Administrators who use customized configuration files will lose their customizations. The changes made by this modification will be lost if a migration install is done; it will be necessary to re-apply the change. This change will be made permanent in a future release of AIX.


Block or Restrict Access

Using a firewall or similar technology, block access to vulnerable AIX sendmail systems (SMTP 25/tcp) from untrusted networks such as the Internet.


Vendor Information

814617

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

IBM __ Affected

Notified: March 11, 2003 Updated: June 11, 2003

Status

Affected

Vendor Statement

The issues discussed in CERT vulnerability note VU#814617 are addressed by changing the Sendmail configuration settings.

The modification instructions and updated configuration files can be obtained from:

<ftp://aix.software.ibm.com/aix/efixes/security/sendmail_3_mod.tar.Z&gt;
For more information, please contact your AIX Support Center.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23814617 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was reported by Tom Perrine of the San Diego Supercomputer Center.

This document was written by Art A Manion.

Other Information

CVE IDs: CVE-2003-0285
Severity Metric: 6.30 Date Public:

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.007 Low

EPSS

Percentile

79.7%

Related for VU:814617