CVE-1999-0129

MEDIUM4.6/ 10.0
Share:
Published: December 3, 1996 at 05:00 AM
Modified: April 3, 2025 at 01:03 AM
Source: cve@mitre.org

Vulnerability Description

Sendmail allows local users to write to a file and gain group permissions via a .forward or :include: file.

CVSS Metrics

Base Score
4.6
Severity
MEDIUM
Vector String
AV:L/AC:L/Au:N/C:P/I:P/A:P

Weaknesses (CWE)

NVD-CWE-Other
Source: nvd@nist.gov

AI Security Analysis

01 // Technical Summary

Sendmail, a widely used email server, is vulnerable to a local privilege escalation. Attackers can exploit this flaw by manipulating .forward or :include: files to gain group-level permissions, potentially leading to complete system compromise and data exfiltration. This vulnerability allows unauthorized modification of system files and execution of arbitrary commands with elevated privileges.

02 // Vulnerability Mechanism

Step 1: File Creation: The attacker creates a malicious .forward or :include: file in their home directory. This file contains commands designed to write to a system file or execute a privileged command.

Step 2: Triggering Sendmail: The attacker sends an email to their own account or another account configured to use the malicious .forward or :include: file. This triggers Sendmail to process the file.

Step 3: Privilege Escalation: Sendmail, running with the group privileges of mail or smmsp, executes the commands in the malicious file. The commands write to a system file (e.g., /etc/passwd) or execute a privileged command, effectively granting the attacker elevated privileges.

Step 4: System Compromise: The attacker uses the newly acquired privileges to gain control of the system, potentially installing backdoors, stealing data, or disrupting services.

03 // Deep Technical Analysis

The vulnerability stems from Sendmail's insecure handling of .forward and :include: files. When Sendmail processes these files to forward or include other files, it often does so with the group privileges of the mail or smmsp user, depending on the system configuration. The root cause is a lack of proper input validation and access control when writing to these files. An attacker can create a malicious .forward or :include: file that, when processed by Sendmail, writes to a system file with the group privileges of the Sendmail process. This allows the attacker to overwrite critical system files, such as /etc/passwd or /etc/shadow, or to execute arbitrary commands with elevated privileges. The flaw is not a specific buffer overflow or race condition, but rather a design flaw in how Sendmail handles file permissions and user input when processing these configuration files.

CVE-1999-0129 - MEDIUM Severity (4.6) | Free CVE Database | 4nuxd