Sendmail < 8.12.8 Double Pipe smrsh Bypass Overflow
High Nessus Network Monitor Plugin ID 2039
SynopsisThe remote host is vulnerable to a flaw that may allow attackers to execute arbitrary commands
Descriptionsmrsh (supplied by Sendmail) is designed to prevent the execution of commands outside of the restricted environment. However, when commands are entered using either double pipes (||) or a mixture of dot and slash characters, a user may be able to bypass the checks performed by smrsh. This can lead to the execution of commands outside of the restricted environment.
SolutionUpgrade to Sendmail 8.12.8 or higher.