Sendmail < 8.12.8 Double Pipe smrsh Bypass Overflow

High Nessus Network Monitor Plugin ID 2039

Synopsis

The remote host is vulnerable to a flaw that may allow attackers to execute arbitrary commands

Description

smrsh (supplied by Sendmail) is designed to prevent the execution of commands outside of the restricted environment. However, when commands are entered using either double pipes (||) or a mixture of dot and slash characters, a user may be able to bypass the checks performed by smrsh. This can lead to the execution of commands outside of the restricted environment.

Solution

Upgrade to Sendmail 8.12.8 or higher.

Plugin Details

Severity: High

ID: 2039

File Name: 2039.prm

Family: SMTP Servers

Published: 2004/08/18

Modified: 2016/11/23

Dependencies: 2004, 2005

Nessus ID: 11321

Risk Information

Risk Factor: High

CVSSv2

Base Score: 8.3

Temporal Score: 6.9

Vector: CVSS2#AV:A/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

CVSSv3

Base Score: 8.7

Temporal Score: 8

Vector: CVSS3#AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS3#E:F/RL:O/RC:C

Reference Information

CVE: CVE-2002-1165, CVE-2002-1337

BID: 6991, 5845

OSVDB: 4502, 9305