RHEL 2.1 : sendmail (RHSA-2002:259)

medium Nessus Plugin ID 12335
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

The sendmail packages shipped with Red Hat Linux Advanced Server have a security bug if sendmail is configured to use smrsh. This security errata release fixes the problem.

[Updated 06 Feb 2003] Added fixed packages for Advanced Workstation 2.1

SMRSH (the SendMail Restricted SHell) is a /bin/sh replacement for Sendmail. It provides the ability to limit the set of executable programs available to Sendmail.

A bug in the version of smrsh packaged as part of Sendmail 8.12.6 and 8.11.6 allows attackers to bypass shrsh's intended restrictions. This can be done by inserting additional commands after '||' or '/' characters, which are not properly filtered or verified. A sucessful attack would allow an attacker who has a local account on a system to execute arbitrary binaries as themselves by utilizing their .forward file.

Because sendmail as shipped with Red Hat Linux Advanced Server is not configured to use smrsh, this issue only affects users who have customized their sendmail configuration to use smrsh.

Users who have configured sendmail to use smrsh should update to these errata packages which contain a backported security fix, and are therefore not vulnerable to this issue.

Solution

Update the affected packages.

See Also

https://access.redhat.com/security/cve/cve-2002-1165

https://marc.info/?l=bugtraq&m=103350914307274

https://access.redhat.com/errata/RHSA-2002:259

Plugin Details

Severity: Medium

ID: 12335

File Name: redhat-RHSA-2002-259.nasl

Version: 1.26

Type: local

Agent: unix

Published: 7/6/2004

Updated: 1/14/2021

Dependencies: ssh_get_info.nasl

Risk Information

VPR

Risk Factor: Medium

Score: 6.1

CVSS v2

Risk Factor: Medium

Base Score: 4.6

Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:sendmail, p-cpe:/a:redhat:enterprise_linux:sendmail-cf, p-cpe:/a:redhat:enterprise_linux:sendmail-devel, p-cpe:/a:redhat:enterprise_linux:sendmail-doc, cpe:/o:redhat:enterprise_linux:2.1

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 2/5/2003

Vulnerability Publication Date: 10/11/2002

Reference Information

CVE: CVE-2002-1165

RHSA: 2002:259