CDE Mailer (dtmail) is the mail user agent (MUA) for CDE, which is
installed on Solaris 8 and 9 by default. It provides an intuitive,
easy-to-use GUI for reading, sending, and managing electronic mail.
Dtmail supports both MIME and Sun Mail Tool message formats for reading
and sending messages. In addition to local and NFS mailboxes, it also
supports the use of IMAP4 for accessing remote mailboxes. Dtmail
provides a mail-pervasive desktop environment by supporting the Mail(4)
and Display(4) Media Exchange messages. Other applications can compose,
send, and display electronic mail messages using the ToolTalk API and
these Media Exchange messages.
Exploitation of a format string vulnerability in the dtmail binary
included with CDE can allow local attackers to gain mail group
The vulnerability specifically exists due to improper usage of a
formatted print function which allows a user supplied format to be
processed via the argv value. Local attackers can specify a special
argv containing format string characters to trigger the
vulnerability and execute arbitrary code. Program arguments are copied
onto the heap before being processed, so systems with non-executable
stack protection are also easily affected.
Successful exploitation leads to group mail access. CDE is a widely
deployed default desktop environment for UNIX operating systems. Gaining
the ability to read other user email accounts, including root, could
lead to exposure of highly sensitive data. The vulnerability is easily
exploitable even when stack protections are enabled, furthering the
impact of exposure.
iDEFENSE has confirmed the existence of this vulnerability in Solaris 8
and Solaris 9. It is believed that this vulnerability only affects the
Solaris implementation of CDE Mailer.
iDEFENSE is currently unaware of a workaround for this vulnerability.
The Sun advisory for this issue (SunAlert #57627) is available at:
The Common Vulnerabilities and Exposures (CVE) project has assigned the
name CAN-2004-0800 to this issue. This is a candidate for inclusion in
the CVE list (http://cve.mitre.org), which standardizes names for
03/04/2004 Initial vendor contact
03/04/2004 iDEFENSE clients notified
03/31/2004 Initial vendor response
04/19/2004 Initial vendor contact
04/19/2004 Initial vendor response (Sun Microsystems)
04/20/2004 Initial vendor response (Hewlett-Packard)
08/24/2004 Public disclosure
iDEFENSE Labs is credited with discovering this vulnerability.
Get paid for vulnerability research
Copyright © 2004 Verisign, Inc.
Permission is granted for the redistribution of this alert
electronically. It may not be edited in any way without the express
written consent of iDEFENSE. If you wish to reprint the whole or any
part of this alert in any other medium other than electronically, please
email firstname.lastname@example.org for permission.
Disclaimer: The information in the advisory is believed to be accurate
at the time of publishing based on currently available information. Use
of the information constitutes acceptance for use in an as is condition.
There are no warranties with regard to this information. Neither the
author nor the publisher accepts any liability for any direct, indirect,
or consequential loss or damage arising from use of, or reliance on,