Directory traversal vulnerability in the setuid root helper binary in S-nail (later S-mailx) before 14.8.16 allows local users to write to arbitrary files and consequently gain root privileges via a .. (dot dot) in the randstr argument.
http://www.securityfocus.com/bid/96138
http://www.openwall.com/lists/oss-security/2017/02/07/4
https://www.mail-archive.com/s-nail-users%40lists.sourceforge.net/msg00551.html
http://www.openwall.com/lists/oss-security/2017/01/27/7
Source: Mitre, NVD
Published: 2017-03-27
Updated: 2025-04-20
Base Score: 6.9
Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C
Severity: Medium
Base Score: 7
Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Severity: High
EPSS: 0.01046