COMMAND
Seattle Lab Sendmail v2.5
SYSTEMS AFFECTED
WinNT
PROBLEM
David LeBlanc found following. Version 2.5 (current version when
writing this) is vulnerable to a buffer overrun attack on the POP3
service. If the username supplied is too long, the service will
fail with a memory exception. There are no current exploits
which can cause remote execution, but given the characteristics
of the failure, it seems entirely possible that this could occur.
At the very least, it constitutes a denial of service which will
require rebooting the server if attacked.
SOLUTION
Seattle Lab reported that the problem has been fixed in v2.6,
which should be available in beta form on 17th Oct 1997.
The current shipping versions of both the UNIX and NT ISS Scanners
are capable of causing these failures.