Sendmail 8.8.8 - 8.12.7 Multiple Vulnerabilities (Bypass, OF)

critical Nessus Plugin ID 11321


The remote host has an application that is affected by multiple vulnerabilities.


smrsh (supplied by Sendmail) is designed to prevent the execution of commands outside of the restricted environment. However, when commands are entered using either double pipes (||) or a mixture of dot and slash characters, a user may be able to bypass the checks performed by smrsh. This can lead to the execution of commands outside of the restricted environment.

In addition, a function in headers.c does not properly sanitize input supplied via the 'Address Field' causing an exploitable buffer overflow condition. However, Nessus has not checked for this.


Upgrade to Sendmail 8.12.8 or later.

Plugin Details

Severity: Critical

ID: 11321

File Name: SHN_Sendmail_DoublePipe.nasl

Version: 1.25

Type: remote

Published: 3/5/2003

Updated: 6/27/2018

Risk Information


Risk Factor: Critical

Score: 9.4


Risk Factor: Critical

Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:H/RL:OF/RC:C

Vulnerability Information

Required KB Items: SMTP/sendmail

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 10/1/2002

Reference Information

CVE: CVE-2002-1165, CVE-2002-1337

BID: 5845

RHSA: 2003:073-06

SuSE: SUSE-SA:2003:023