icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons_061

Sendmail < 8.12.8 Double Pipe smrsh Bypass Overflow

High

Synopsis

The remote host is vulnerable to a flaw that may allow attackers to execute arbitrary commands

Description

smrsh (supplied by Sendmail) is designed to prevent the execution of commands outside of the restricted environment. However, when commands are entered using either double pipes (||) or a mixture of dot and slash characters, a user may be able to bypass the checks performed by smrsh. This can lead to the execution of commands outside of the restricted environment.

Solution

Upgrade to Sendmail 8.12.8 or higher.