7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
0.001 Low
EPSS
Percentile
40.9%
Package : heirloom-mailx
Version : 12.4-2+deb6u1
CVE ID : CVE-2004-2771 CVE-2014-7844
Two security vulnerabilities were discovered in Heirloom mailx, an
implementation of the "mail" command:
CVE-2004-2771
mailx interprets interprets shell meta-characters in certain email
addresses.
CVE-2014-7844
An unexpected feature of mailx treats syntactically valid email
addresses as shell commands to execute.
Shell command execution can be re-enabled using the "expandaddr"
option.
Note that this security update does not remove all mailx facilities
for command execution, though. Scripts which send mail to addresses
obtained from an untrusted source (such as a web form) should use the
"β" separator before the email addresses (which was fixed to work
properly in this update), or they should be changed to invoke
"mail -t" or "sendmail -i -t" instead, passing the recipient addresses
as part of the mail header.
For the oldstable distribution (squeeze), these problems have been fixed in
version 12.4-2+deb6u1.
We recommend that you upgrade your heirloom-mailx packages.
β
RaphaΓ«l Hertzog β Debian Developer
Support Debian LTS: http://www.freexian.com/services/debian-lts.html
Learn to master Debian: http://debian-handbook.info/get/
Attachment:
signature.asc
Description: Digital signature
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 7 | ia64 | bsd-mailx | <Β 8.1.2-0.20111106cvs-1+deb7u1 | bsd-mailx_8.1.2-0.20111106cvs-1+deb7u1_ia64.deb |
Debian | 7 | sparc | heirloom-mailx | <Β 12.5-2+deb7u1 | heirloom-mailx_12.5-2+deb7u1_sparc.deb |
Debian | 7 | s390x | heirloom-mailx | <Β 12.5-2+deb7u1 | heirloom-mailx_12.5-2+deb7u1_s390x.deb |
Debian | 6 | amd64 | bsd-mailx | <Β 8.1.2-0.20100314cvs-1+deb6u1 | bsd-mailx_8.1.2-0.20100314cvs-1+deb6u1_amd64.deb |
Debian | 7 | kfreebsd-amd64 | heirloom-mailx | <Β 12.5-2+deb7u1 | heirloom-mailx_12.5-2+deb7u1_kfreebsd-amd64.deb |
Debian | 6 | all | heirloom-mailx | <Β 12.4-2+deb6u1 | heirloom-mailx_12.4-2+deb6u1_all.deb |
Debian | 7 | all | heirloom-mailx | <Β 12.5-2+deb7u1 | heirloom-mailx_12.5-2+deb7u1_all.deb |
Debian | 7 | ia64 | heirloom-mailx | <Β 12.5-2+deb7u1 | heirloom-mailx_12.5-2+deb7u1_ia64.deb |
Debian | 7 | armhf | bsd-mailx | <Β 8.1.2-0.20111106cvs-1+deb7u1 | bsd-mailx_8.1.2-0.20111106cvs-1+deb7u1_armhf.deb |
Debian | 7 | s390 | bsd-mailx | <Β 8.1.2-0.20111106cvs-1+deb7u1 | bsd-mailx_8.1.2-0.20111106cvs-1+deb7u1_s390.deb |
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
0.001 Low
EPSS
Percentile
40.9%