HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual S 5.19 Use of the sendmail security mechanisms

S 5.19 Use of the sendmail security mechanisms

Initiation responsibility: IT Security Management, Administrators

Implementation responsibility: Administrators

Since mail transmission would appear to be the application most frequently used in networks, the pertinent processes are of particular importance and are one of the most common targets in a system. A further aspect is the fact that these processes often have set the suid bit and belong to a privileged user (e.g. root or bin). For instance, a fault in sendmail was one of the reasons for the propagation of the Internet worm.

.
© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
July 1999
home