{"vuid":"VU#814617","idnumber":"814617","name":"IBM AIX sendmail configured as open mail relay by default","keywords":["IBM","AIX","sendmail","sendmail.cf","mail relay","overwrite configuration file","mta","spam","open relay","smtp","esmtp"],"overview":"Sendmail shipped with IBM AIX is configured by default as an open mail relay. Unauthenticated, remote users can route mail through such a system.","clean_desc":"Sendmail is a widely used mail transfer agent (MTA) that is included with IBM AIX. According to IBM: The default configuration files for sendmail enable three sendmail options which allow arbitrary users to route email via sendmail. The options are \"promiscuous_relay\", \"accept_unresolvable_domains\" and \"accept_unqualified_senders\". In this configuration, sendmail accepts messages addressed from and to non-local email domains.","impact":"Any remote user can route mail through sendmail on a vulnerable IBM AIX system. This configuration is called an \"open relay\" and such systems are frequently abused to deliver unsolicited commercial email (UCE) or SPAM.","resolution":"Modify sendmail Configuration\nConfigure sendmail not to accept messages addressed from and to foreign domains on behalf of unauthenticated users. IBM has released an advisory and updated configuration files for sendmail on AIX: ftp://aix.software.ibm.com/aix/efixes/security/sendmail_3_mod.tar.Z\nFrom the IBM advisory: Note that this change should only be applied to systems using the default configuration files. Administrators who use customized configuration files will lose their customizations. The changes made by this modification will be lost if a migration install is done; it will be necessary to re-apply the change. This change will be made permanent in a future release of AIX.","workarounds":"Block or Restrict Access Using a firewall or similar technology, block access to vulnerable AIX sendmail systems (SMTP 25/tcp) from untrusted networks such as the Internet.","sysaffected":"","thanks":"This vulnerability was \nreported\n by Tom Perrine of the San Diego Supercomputer Center.","author":"This document was written by Art A Manion.","public":["http://security.sdsc.edu/advisories/2003.05.13-AIX-sendmail.txt","http://www.securityfocus.com/archive/1/321307","ftp://aix.software.ibm.com/aix/efixes/security/sendmail_3_mod.tar.Z","http://www.iss.net/security_center/static/11993.php","http://www.securityfocus.com/bid/7580"],"cveids":["CVE-2003-0285"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2003-03-11T21:40:56Z","publicdate":"2003-05-13T00:00:00Z","datefirstpublished":"2003-06-17T21:55:59Z","dateupdated":"2003-06-17T22:43:51Z","revision":36,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"7","cam_internetinfrastructure":"6","cam_population":"10","cam_impact":"3","cam_easeofexploitation":"20","cam_attackeraccessrequired":"20","cam_scorecurrent":"6.3","cam_scorecurrentwidelyknown":"7.425","cam_scorecurrentwidelyknownexploited":"10.35","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":6.3,"vulnote":null}