Sendmail 8.8.8 - 8.12.7 Multiple Vulnerabilities (Bypass, OF)

critical Nessus Plugin ID 11321

Synopsis

The remote host has an application that is affected by multiple vulnerabilities.

Description

smrsh (supplied by Sendmail) is designed to prevent the execution of commands outside of the restricted environment. However, when commands are entered using either double pipes (||) or a mixture of dot and slash characters, a user may be able to bypass the checks performed by smrsh. This can lead to the execution of commands outside of the restricted environment.

In addition, a function in headers.c does not properly sanitize input supplied via the 'Address Field' causing an exploitable buffer overflow condition. However, Nessus has not checked for this.

Solution

Upgrade to Sendmail 8.12.8 or later.

Plugin Details

Severity: Critical

ID: 11321

File Name: SHN_Sendmail_DoublePipe.nasl

Version: 1.25

Type: remote

Published: 3/5/2003

Updated: 6/27/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.2

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

Required KB Items: SMTP/sendmail

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 10/1/2002

Reference Information

CVE: CVE-2002-1165, CVE-2002-1337

BID: 5845

RHSA: 2003:073-06

SuSE: SUSE-SA:2003:023