Sendmail < 8.12.8 Double Pipe smrsh Bypass Overflow

high Nessus Network Monitor Plugin ID 2039

Synopsis

The remote host is vulnerable to a flaw that may allow attackers to execute arbitrary commands

Description

smrsh (supplied by Sendmail) is designed to prevent the execution of commands outside of the restricted environment. However, when commands are entered using either double pipes (||) or a mixture of dot and slash characters, a user may be able to bypass the checks performed by smrsh. This can lead to the execution of commands outside of the restricted environment.

Solution

Upgrade to Sendmail 8.12.8 or higher.

Plugin Details

Severity: High

ID: 2039

Family: SMTP Servers

Published: 8/18/2004

Updated: 3/6/2019

Nessus ID: 11321

Risk Information

VPR

Risk Factor: Critical

Score: 9.2

CVSS v2

Risk Factor: High

Base Score: 8.3

Temporal Score: 6.9

Vector: CVSS2#AV:A/AC:L/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 8.2

Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:sendmail:sendmail

Reference Information

CVE: CVE-2002-1165, CVE-2002-1337

BID: 6991, 5845