The Sendmail, Inc. security advisory template will be used for all security notifications, regardless of whether a patch is required or a workaround is provided to the customer. The parenthetical references are described in the Notes section. Each section of the advisory contains a description of that section with examples, both of which will not be in the final advisory. The examples are purposefully kept short to save space. Actual advisories may be longer, but they must be concise. All Sendmail advisories will be done in plain text and PGP signed using the Security Officer PGP key available from: http://www.sendmail.com/security/security-officer.asc This template is subject to change without notice. ============================================================================= Sendmail-SA-YYYYMM-## (1) Security Advisory Sendmail, Inc. Topic: One line description of the issue (2) Class: Class (3) Severity: Severity (4) Announced: YYYY-MM-DD HH:MM ZZZ (5) Revised: YYYY-MM-DD HH:MM ZZZ (6) Credits: List problem reporter(s) (7) Affects: List affected products/versions (8) Resolved: List fixed versions (9) For general information regarding Sendmail, Inc. Security Advisories, including descriptions of the fields above, other security advisories, and the following sections, please visit . I. Background The Background section describes the affected program and what it is used for. It does not discuss the problem itself, but could be used to discuss the functionality in the program where the problem exists. An example might be: Sendmail Switch includes the sendmail MTA which is used to route mail into and out of an organization using SMTP. That protocol uses timeouts to prevent resource starvation on the server. II. Problem Description The Problem Description section explains the security hole. This can include information on flawed code, or even how the program may be maliciously used to open a security hole. An example might be: The implementation of SMTP protocol timeouts in sendmail used UNIX signals, which can inadvertently interrupt code flow leaving a variable in an inconsistent state. III. Impact The Impact section describes what type of impact the problem may have on a system. For example, this can be anything from a denial of service attack, to extra privileges available to users, or even giving the attacker superuser access. For example: By taking advantage of a race condition in the signaling used to implement timeouts, a remote attacker may be able to exploit the problem using a timed attack. If successfully exploited, the attacker may be able to modify files writable by sendmail's RunAsUser or execute commands as that user. IV. Workaround The Workaround section offers a feasible workaround to system administrators who may be incapable of upgrading the system. This may be due to time constraints, network availability, or a slew of other reasons. Regardless, security is not to be taken lightly, and an affected system needs to be patched or the workaround needs to be implemented. If there is no workaround available, that will be stated here. For example: You can work around this problem by disabling all SMTP timeouts. However, doing so may leave your system vulnerable to resource starvation. or another example: No workaround is available for this problem. V. Solution The Solution section offers instructions on patching the affected product(s). This is a step by step description, tested and verified method for getting a product patched and working securely. This section is likely to be the longest in the advisory as different instructions may be needed for different products. A shortened example: Login to support system at to download the 3.1.8 cumulative patch. Apply the Switch 3.1.8 patch per instructions in the included README.txt. VI. References The References section usually offers sources of other information. This can included web URLs, books, mailing lists, and newsgroups. For example: CVE: http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0058 Sendmail KB: https://www.sendmail.com/cfusion/CFIDE/kb_doc.cfm?kb_id=S10621 FAQ: http://www.sendmail.com/security/SA-200604-01/faq.shtml VII. Revision Details The Revision Details section contains a list of changes made to the advisory since its initial release. Each revision will be listed separately so readers can see the revision history. For example: 2006-04-16 12:45 PDT: Added a new timeout work around. Correct patch download instructions. 2006-04-17 14:30 PDT: Added CVE reference. ============================================================================= Notes ----- (1) Each advisory will have a unique ID made up of "Sendmail-SA-" followed by the four digit year and the two digit month followed by a counter. The counter resets each month. Examples include "Sendmail-SA-200604-01" and "Sendmail-SA-200611-10", the latter being the tenth advisory for November, 2006. (2) The Topic field indicates exactly what the problem is. It is an introduction to the current security advisory and identifies the program with the vulnerability. For example: Topic: Remote privilege escalation in sendmail MTA (3) The Class field uses one of the following values to describe the type of security problem. Each type is prefixed with "Local" or "Remote" to indicate whether the attack can be performed by a local user or a remote user (e.g., "Local Denial of Service" or "Remote Policy Bypass"). A "Remote" attack assumes the ability for "Local" users to attack the service as well. Denial of Service - Interrupting, inhibiting, or disabling of a service by triggering a bug in the service or exhausting resources needed to provide that service. Policy Bypass - The ability to bypass access restrictions on the service. For example, injecting dangerous content that policy should block or promiscuous relaying of mail. Information leak - Providing information to an attacker which would normally not be available. Examples include revealing the contents of files, hidden fields in databases, or traffic/logs for other users of that service. Privilege escalation - A condition which gives an attacker privileges above and beyond those to which the user is entitled. Examples include the ability to create arbitrary files, influence content of files, start and stop services, go beyond the user or service's resource limits, or becoming another user, including potentially root. Code execution - The ability for a remote entity to execute arbitrary code on the server that is outside the functionality provided by the service. For example, using the SMTP ETRN command to cause a queue run to occur is not considered "remote code execution" as that is the expected behavior of the ETRN command. (4) The Severity field uses one of the following values to describe the severity of the problem. Critical - An easily exploitable condition which has serious end user consequences (i.e., public exploit available or relatively easy to create an exploit). High - An exploitable condition which has serious end user consequences but is not easily exploitable (i.e., no known exploits and difficult to produce an exploit). Medium - An exploitable condition which has moderate end user consequences but doesn't present a clear and present danger for end users. Low - A condition which could almost be considered an annoyance, does not have a serious impact on end users, and can easily be worked around. (5) The Announced field reflects the date the security advisory was published, or announced to the world. This means the Sendmail security team has verified that the problem does exist and, if applicable, that a patch has been made available. For example: Announced: 2006-04-17 08:00 PDT (6) The Revised field reflects the date the advisory was last revised with new information or corrections. Additionally, a change log for each revision will be put in section VIII. This field only exists in advisories which have been revised since the initial creation. For example: Revised: 2006-04-17 14:30 PDT (7) The Credits field gives credit to the individual(s) or organization(s) who noticed the vulnerability and reported it. For example: Credits: Rob Davies from the Internet Security Union John Simpson from Worcester Polytechnic Institute (8) The Affects field explains which versions of our products are affected by this vulnerability. For example: Affects: Sendmail Pro (all versions) Sendmail Switch 2.X and 3.X (up to and including 3.1.8) Sendmail Sentrion 1.0-1.5 (9) The Resolved field indicates the versions which include the correction. For example: Resolved: Sendmail Switch 3.1.9 Sendmail Sentrion 1.5.1 $Revision: 1.11 $ $Date: 2006/09/09 00:16:38 $