Sendmail 'decode' Alias Arbitrary File Overwrite

medium Nessus Network Monitor Plugin ID 2026

Synopsis

The remote host is vulnerable to a flaw that allows for the bypassing of authentication.

Description

The remote Sendmail server may pipe email sent to the 'decode' alias to a program, which is prone to various security issues.

Solution

Remove the 'decode' entry from /etc/aliases.

Plugin Details

Severity: Medium

ID: 2026

Family: SMTP Servers

Published: 8/18/2004

Updated: 3/6/2019

Nessus ID: 10248

Risk Information

VPR

Risk Factor: Low

Score: 1.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS v3

Risk Factor: Medium

Base Score: 5.8

Temporal Score: 5.6

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:X/RL:O/RC:C

Reference Information

CVE: CVE-1999-0096