CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
AI Score
Confidence
Low
EPSS
Percentile
48.9%
Sendmail Consortium’s Restricted Shell (SMRSH) in Sendmail 8.12.6, 8.11.6-15, and possibly other versions after 8.11 from 5/19/1998, allows attackers to bypass the intended restrictions of smrsh by inserting additional commands after (1) “||” sequences or (2) “/” characters, which are not properly filtered or verified.
Vendor | Product | Version | CPE |
---|---|---|---|
sendmail | sendmail | 8.12.0 | cpe:2.3:a:sendmail:sendmail:8.12.0:*:*:*:*:*:*:* |
sendmail | sendmail | 8.12.1 | cpe:2.3:a:sendmail:sendmail:8.12.1:*:*:*:*:*:*:* |
sendmail | sendmail | 8.12.2 | cpe:2.3:a:sendmail:sendmail:8.12.2:*:*:*:*:*:*:* |
sendmail | sendmail | 8.12.3 | cpe:2.3:a:sendmail:sendmail:8.12.3:*:*:*:*:*:*:* |
sendmail | sendmail | 8.12.4 | cpe:2.3:a:sendmail:sendmail:8.12.4:*:*:*:*:*:*:* |
sendmail | sendmail | 8.12.5 | cpe:2.3:a:sendmail:sendmail:8.12.5:*:*:*:*:*:*:* |
sendmail | sendmail | 8.12.6 | cpe:2.3:a:sendmail:sendmail:8.12.6:*:*:*:*:*:*:* |
netbsd | netbsd | 1.5 | cpe:2.3:o:netbsd:netbsd:1.5:*:*:*:*:*:*:* |
netbsd | netbsd | 1.5.1 | cpe:2.3:o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:* |
netbsd | netbsd | 1.5.2 | cpe:2.3:o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:* |
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-023.txt.asc
distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000532
marc.info/?l=bugtraq&m=103350914307274&w=2
secunia.com/advisories/7826
www.iss.net/security_center/static/10232.php
www.mandriva.com/security/advisories?name=MDKSA-2002:083
www.redhat.com/support/errata/RHSA-2003-073.html
www.securityfocus.com/bid/5845
www.sendmail.org/smrsh.adv.txt