Shielding Vulnerable Clients With PMDF http://www.ciac.org/ciac/bulletins/i-077b.shtml
Note that PMDF itself is not vulnerable to this sort of buffer overrun. PMDF uses counted strings rather than null terminated strings. PMDF has always been coded this way. This one fact alone eliminates all sorts of potential problems -- the sort of problems being found now in these clients and that have occurred in sendmail and sendmail-derived mail systems, for instance -- since PMDF programs tend to truncate things rather than overrunning buffers. PMDF also avoids using character pointers, preferring instead to use array constructs where run-time bounds checking is possible. So you end up with two layers of checking in PMDF, one explicitly coded in to the string primitives we use, the other provided by the language environment itself. Many sites use PMDF either as a POP or IMAP server itself, or use PMDF as a backbone relaying to Microsoft Exchange or Netscape servers. In such configurations, PMDF provides centralized addressing schemes, support for legacy e-mail systems, and many functions for restructuring messages. One feature of message restructuring is that PMDF sanitizes messages passing through, presenting only "safe" messages to the vulnerable client environment. Solution ApproachTo obtain the greatest amount of protection in the simplest fashion, PMDF sites with the current version of software should fetch a libpmdf.so (UNIX) or PMDFSHR.EXE (OpenVMS) image dated 31-July-1998 from the Process PMDF FTP site.[1] And then, if they have not already enabled PMDF processing of message content, enable such processing. For instance, such message processing can be enabled by inserting the line
defaults inner in the PMDF configuration file as the first channel definition.
1. Sites with older releases of PMDF software will need to use a different approach in order to enable processing of message content. For more information on those steps please follow this link. |
Home > Support > Tech Tips > PMDF > Technical Notes
