Sendmail 8.8.8 - 8.12.7 Multiple Vulnerabilities (Bypass, OF)

Critical Nessus Plugin ID 11321


The remote host has an application that is affected by multiple vulnerabilities.


smrsh (supplied by Sendmail) is designed to prevent the execution of commands outside of the restricted environment. However, when commands are entered using either double pipes (||) or a mixture of dot and slash characters, a user may be able to bypass the checks performed by smrsh. This can lead to the execution of commands outside of the restricted environment.

In addition, a function in headers.c does not properly sanitize input supplied via the 'Address Field' causing an exploitable buffer overflow condition. However, Nessus has not checked for this.


Upgrade to Sendmail 8.12.8 or later.

Plugin Details

Severity: Critical

ID: 11321

File Name: SHN_Sendmail_DoublePipe.nasl

Version: $Revision: 1.24 $

Type: remote

Published: 2003/03/05

Modified: 2017/04/27

Dependencies: 10263, 17975

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:H/RL:OF/RC:C

Vulnerability Information

Required KB Items: SMTP/sendmail

Exploit Available: true

Exploit Ease: No exploit is required

Vulnerability Publication Date: 2002/10/01

Reference Information

CVE: CVE-2002-1165, CVE-2002-1337

BID: 5845

OSVDB: 4502, 9305

RHSA: 2003:073-06

SuSE: SUSE-SA:2003:023