* Mark Martinec <mark.martinec...@ijs.si>:
> On Thursday February 10 2011 21:14:59 Adam Katz wrote:
> > Does this affect sendmail as well as postfix?  I assume so,
> > but wanted an explicit confirmation.
> 
> Yes, the security hole is entirely within the milter,
> independent of the MTA.

I tried the exploit and it seems that Postfix' restrictions that check for FQDN
address and correct recipient syntax prevent the exploit from getting through:

telnet mail.example.de 25
220 mail.example.de ESMTP Postfix
HELO foo
250 mail.example.de
MAIL FROM:<>
250 2.1.0 Ok
RCPT TO:root+:"|touch /tmp/foo"
501 5.1.3 Bad recipient address syntax
RCPT TO:<root+:"|touch /tmp/foo">
504 5.5.2 <root+:|touch /tmp/foo>: Recipient address rejected: need 
fully-qualified address
RCPT TO:<root@localhost+:"|touch /tmp/foo">
501 5.1.3 Bad recipient address syntax
QUIT
221 2.0.0 Bye

Can anyone confirm this?

p@rick


-- 
state of mind
Digitale Kommunikation

http://www.state-of-mind.de

Franziskanerstraße 15      Telefon +49 89 3090 4664
81669 München              Telefax +49 89 3090 4666

Amtsgericht München        Partnerschaftsregister PR 563

Reply via email to