Sendmail 8.8.8 - 8.12.7 Multiple Vulnerabilities (Bypass, OF)

critical Nessus Plugin ID 11321
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The remote host has an application that is affected by multiple vulnerabilities.


smrsh (supplied by Sendmail) is designed to prevent the execution of commands outside of the restricted environment. However, when commands are entered using either double pipes (||) or a mixture of dot and slash characters, a user may be able to bypass the checks performed by smrsh. This can lead to the execution of commands outside of the restricted environment.

In addition, a function in headers.c does not properly sanitize input supplied via the 'Address Field' causing an exploitable buffer overflow condition. However, Nessus has not checked for this.


Upgrade to Sendmail 8.12.8 or later.

Plugin Details

Severity: Critical

ID: 11321

File Name: SHN_Sendmail_DoublePipe.nasl

Version: 1.25

Type: remote

Published: 3/5/2003

Updated: 6/27/2018

Dependencies: find_service1.nasl, smtpserver_detect.nasl

Risk Information


Risk Factor: Critical

Score: 9.6


Risk Factor: Critical

Base Score: 10

Temporal Score: 8.7

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: E:H/RL:OF/RC:C

Vulnerability Information

Required KB Items: SMTP/sendmail

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 10/1/2002

Reference Information

CVE: CVE-2002-1165, CVE-2002-1337

BID: 5845

RHSA: 2003:073-06

SuSE: SUSE-SA:2003:023