Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2002-1165
Vulnerability from cvelistv5
Published
2002-10-03 04:00
Modified
2024-08-08 03:19
Severity ?
EPSS score ?
Summary
Sendmail Consortium's Restricted Shell (SMRSH) in Sendmail 8.12.6, 8.11.6-15, and possibly other versions after 8.11 from 5/19/1998, allows attackers to bypass the intended restrictions of smrsh by inserting additional commands after (1) "||" sequences or (2) "/" characters, which are not properly filtered or verified.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:19:27.715Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2003:073", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-073.html" }, { "name": "CLA-2002:532", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000532" }, { "name": "NetBSD-SA2002-023", "tags": [ "vendor-advisory", "x_refsource_NETBSD", "x_transferred" ], "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-023.txt.asc" }, { "name": "20021001 iDEFENSE Security Advisory 10.01.02: Sendmail smrsh bypass vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=103350914307274\u0026w=2" }, { "name": "sendmail-forward-bypass-smrsh(10232)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/10232.php" }, { "name": "MDKSA-2002:083", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2002:083" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.sendmail.org/smrsh.adv.txt" }, { "name": "5845", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/5845" }, { "name": "7826", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/7826" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-10-01T00:00:00", "descriptions": [ { "lang": "en", "value": "Sendmail Consortium\u0027s Restricted Shell (SMRSH) in Sendmail 8.12.6, 8.11.6-15, and possibly other versions after 8.11 from 5/19/1998, allows attackers to bypass the intended restrictions of smrsh by inserting additional commands after (1) \"||\" sequences or (2) \"/\" characters, which are not properly filtered or verified." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-11-17T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "RHSA-2003:073", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-073.html" }, { "name": "CLA-2002:532", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000532" }, { "name": "NetBSD-SA2002-023", "tags": [ "vendor-advisory", "x_refsource_NETBSD" ], "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-023.txt.asc" }, { "name": "20021001 iDEFENSE Security Advisory 10.01.02: Sendmail smrsh bypass vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=103350914307274\u0026w=2" }, { "name": "sendmail-forward-bypass-smrsh(10232)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/10232.php" }, { "name": "MDKSA-2002:083", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2002:083" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.sendmail.org/smrsh.adv.txt" }, { "name": "5845", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/5845" }, { "name": "7826", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/7826" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-1165", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Sendmail Consortium\u0027s Restricted Shell (SMRSH) in Sendmail 8.12.6, 8.11.6-15, and possibly other versions after 8.11 from 5/19/1998, allows attackers to bypass the intended restrictions of smrsh by inserting additional commands after (1) \"||\" sequences or (2) \"/\" characters, which are not properly filtered or verified." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2003:073", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2003-073.html" }, { "name": "CLA-2002:532", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000532" }, { "name": "NetBSD-SA2002-023", "refsource": "NETBSD", "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-023.txt.asc" }, { "name": "20021001 iDEFENSE Security Advisory 10.01.02: Sendmail smrsh bypass vulnerabilities", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=103350914307274\u0026w=2" }, { "name": "sendmail-forward-bypass-smrsh(10232)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/10232.php" }, { "name": "MDKSA-2002:083", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2002:083" }, { "name": "http://www.sendmail.org/smrsh.adv.txt", "refsource": "CONFIRM", "url": "http://www.sendmail.org/smrsh.adv.txt" }, { "name": "5845", "refsource": "BID", "url": "http://www.securityfocus.com/bid/5845" }, { "name": "7826", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/7826" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-1165", "datePublished": "2002-10-03T04:00:00", "dateReserved": "2002-09-27T00:00:00", "dateUpdated": "2024-08-08T03:19:27.715Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sendmail:sendmail:8.12.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"598F74BA-2B71-435E-92B8-9DEADB3311A5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sendmail:sendmail:8.12.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"79A46DF2-8EEB-40C8-B1CA-01BC064BD25E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sendmail:sendmail:8.12.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"581E5904-1A2B-49FF-BE3F-D42019AD816B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sendmail:sendmail:8.12.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B6CC4C83-4FB9-4344-AFCB-C260659F81DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sendmail:sendmail:8.12.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CAF763B4-58E3-4868-8C92-47DE3E4E5F40\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sendmail:sendmail:8.12.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8A4FCB77-7FAC-4A4B-851C-2F352B44D3CB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sendmail:sendmail:8.12.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6FEB3923-8F4B-4523-84F9-17D1CFA37F8C\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netbsd:netbsd:1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E10D9BF9-FCC7-4680-AD3A-95757FC005EA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"78E8C3A4-9FA7-4F2A-8C65-D4404715E674\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DBA2E3A3-EB9B-4B20-B754-EEC914FB1D47\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netbsd:netbsd:1.5.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7AC78BA4-70F4-4B9F-93C2-B107E4DCC418\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netbsd:netbsd:1.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"28A10F5A-067E-4DD8-B585-ABCD6F6B324E\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"Sendmail Consortium\u0027s Restricted Shell (SMRSH) in Sendmail 8.12.6, 8.11.6-15, and possibly other versions after 8.11 from 5/19/1998, allows attackers to bypass the intended restrictions of smrsh by inserting additional commands after (1) \\\"||\\\" sequences or (2) \\\"/\\\" characters, which are not properly filtered or verified.\"}, {\"lang\": \"es\", \"value\": \"Sendmail Consortium\u0027s Restricted Shell (SMRSH) en Sendmail 8.12.6, 8.11.6-15 y anteriores, permite a atacantes puentear las restricciones pretendidas de smrsh insertando caract\\u00e9res adicionales despu\\u00e9s de secuencias \\\"||\\\" (dos barras verticales) o \\\"/\\\" (barra), que no son adecuadamente filtradas o verificadas.\"}]", "id": "CVE-2002-1165", "lastModified": "2024-11-20T23:40:44.000", "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 4.6, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 3.9, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": true, \"userInteractionRequired\": false}]}", "published": "2002-10-11T04:00:00.000", "references": "[{\"url\": \"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-023.txt.asc\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000532\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=103350914307274\u0026w=2\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/7826\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.iss.net/security_center/static/10232.php\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDKSA-2002:083\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2003-073.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/bid/5845\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.sendmail.org/smrsh.adv.txt\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Patch\", \"Vendor Advisory\"]}, {\"url\": \"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-023.txt.asc\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000532\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=103350914307274\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/7826\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.iss.net/security_center/static/10232.php\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDKSA-2002:083\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2003-073.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/5845\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.sendmail.org/smrsh.adv.txt\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Patch\", \"Vendor Advisory\"]}]", "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2002-1165\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2002-10-11T04:00:00.000\",\"lastModified\":\"2024-11-20T23:40:44.000\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Sendmail Consortium\u0027s Restricted Shell (SMRSH) in Sendmail 8.12.6, 8.11.6-15, and possibly other versions after 8.11 from 5/19/1998, allows attackers to bypass the intended restrictions of smrsh by inserting additional commands after (1) \\\"||\\\" sequences or (2) \\\"/\\\" characters, which are not properly filtered or verified.\"},{\"lang\":\"es\",\"value\":\"Sendmail Consortium\u0027s Restricted Shell (SMRSH) en Sendmail 8.12.6, 8.11.6-15 y anteriores, permite a atacantes puentear las restricciones pretendidas de smrsh insertando caract\u00e9res adicionales despu\u00e9s de secuencias \\\"||\\\" (dos barras verticales) o \\\"/\\\" (barra), que no son adecuadamente filtradas o verificadas.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":4.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":true,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"598F74BA-2B71-435E-92B8-9DEADB3311A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79A46DF2-8EEB-40C8-B1CA-01BC064BD25E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"581E5904-1A2B-49FF-BE3F-D42019AD816B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6CC4C83-4FB9-4344-AFCB-C260659F81DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.12.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAF763B4-58E3-4868-8C92-47DE3E4E5F40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.12.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A4FCB77-7FAC-4A4B-851C-2F352B44D3CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.12.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FEB3923-8F4B-4523-84F9-17D1CFA37F8C\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E10D9BF9-FCC7-4680-AD3A-95757FC005EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78E8C3A4-9FA7-4F2A-8C65-D4404715E674\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBA2E3A3-EB9B-4B20-B754-EEC914FB1D47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AC78BA4-70F4-4B9F-93C2-B107E4DCC418\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28A10F5A-067E-4DD8-B585-ABCD6F6B324E\"}]}]}],\"references\":[{\"url\":\"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-023.txt.asc\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000532\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=103350914307274\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/7826\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.iss.net/security_center/static/10232.php\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2002:083\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2003-073.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/5845\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.sendmail.org/smrsh.adv.txt\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-023.txt.asc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000532\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=103350914307274\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/7826\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.iss.net/security_center/static/10232.php\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2002:083\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2003-073.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/5845\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.sendmail.org/smrsh.adv.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\",\"Vendor Advisory\"]}]}}" } }
gsd-2002-1165
Vulnerability from gsd
Modified
2023-12-13 01:24
Details
Sendmail Consortium's Restricted Shell (SMRSH) in Sendmail 8.12.6, 8.11.6-15, and possibly other versions after 8.11 from 5/19/1998, allows attackers to bypass the intended restrictions of smrsh by inserting additional commands after (1) "||" sequences or (2) "/" characters, which are not properly filtered or verified.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2002-1165", "description": "Sendmail Consortium\u0027s Restricted Shell (SMRSH) in Sendmail 8.12.6, 8.11.6-15, and possibly other versions after 8.11 from 5/19/1998, allows attackers to bypass the intended restrictions of smrsh by inserting additional commands after (1) \"||\" sequences or (2) \"/\" characters, which are not properly filtered or verified.", "id": "GSD-2002-1165", "references": [ "https://access.redhat.com/errata/RHSA-2003:227", "https://access.redhat.com/errata/RHSA-2003:073", "https://access.redhat.com/errata/RHSA-2002:259" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2002-1165" ], "details": "Sendmail Consortium\u0027s Restricted Shell (SMRSH) in Sendmail 8.12.6, 8.11.6-15, and possibly other versions after 8.11 from 5/19/1998, allows attackers to bypass the intended restrictions of smrsh by inserting additional commands after (1) \"||\" sequences or (2) \"/\" characters, which are not properly filtered or verified.", "id": "GSD-2002-1165", "modified": "2023-12-13T01:24:10.064709Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-1165", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Sendmail Consortium\u0027s Restricted Shell (SMRSH) in Sendmail 8.12.6, 8.11.6-15, and possibly other versions after 8.11 from 5/19/1998, allows attackers to bypass the intended restrictions of smrsh by inserting additional commands after (1) \"||\" sequences or (2) \"/\" characters, which are not properly filtered or verified." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2003:073", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2003-073.html" }, { "name": "CLA-2002:532", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000532" }, { "name": "NetBSD-SA2002-023", "refsource": "NETBSD", "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-023.txt.asc" }, { "name": "20021001 iDEFENSE Security Advisory 10.01.02: Sendmail smrsh bypass vulnerabilities", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=103350914307274\u0026w=2" }, { "name": "sendmail-forward-bypass-smrsh(10232)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/10232.php" }, { "name": "MDKSA-2002:083", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2002:083" }, { "name": "http://www.sendmail.org/smrsh.adv.txt", "refsource": "CONFIRM", "url": "http://www.sendmail.org/smrsh.adv.txt" }, { "name": "5845", "refsource": "BID", "url": "http://www.securityfocus.com/bid/5845" }, { "name": "7826", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/7826" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:sendmail:sendmail:8.12.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sendmail:sendmail:8.12.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sendmail:sendmail:8.12.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sendmail:sendmail:8.12.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sendmail:sendmail:8.12.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sendmail:sendmail:8.12.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sendmail:sendmail:8.12.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netbsd:netbsd:1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:netbsd:netbsd:1.5.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:netbsd:netbsd:1.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-1165" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Sendmail Consortium\u0027s Restricted Shell (SMRSH) in Sendmail 8.12.6, 8.11.6-15, and possibly other versions after 8.11 from 5/19/1998, allows attackers to bypass the intended restrictions of smrsh by inserting additional commands after (1) \"||\" sequences or (2) \"/\" characters, which are not properly filtered or verified." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.sendmail.org/smrsh.adv.txt", "refsource": "CONFIRM", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.sendmail.org/smrsh.adv.txt" }, { "name": "5845", "refsource": "BID", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/5845" }, { "name": "sendmail-forward-bypass-smrsh(10232)", "refsource": "XF", "tags": [ "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/10232.php" }, { "name": "NetBSD-SA2002-023", "refsource": "NETBSD", "tags": [], "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-023.txt.asc" }, { "name": "RHSA-2003:073", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2003-073.html" }, { "name": "CLA-2002:532", "refsource": "CONECTIVA", "tags": [], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000532" }, { "name": "MDKSA-2002:083", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2002:083" }, { "name": "7826", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/7826" }, { "name": "20021001 iDEFENSE Security Advisory 10.01.02: Sendmail smrsh bypass vulnerabilities", "refsource": "BUGTRAQ", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=103350914307274\u0026w=2" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2016-10-18T02:24Z", "publishedDate": "2002-10-11T04:00Z" } } }
rhsa-2002:259
Vulnerability from csaf_redhat
Published
2003-01-30 19:28
Modified
2024-11-21 22:31
Summary
Red Hat Security Advisory: sendmail security update
Notes
Topic
The sendmail packages shipped with Red Hat Linux Advanced Server have a
security bug if sendmail is configured to use smrsh. This security errata
release fixes the problem.
[Updated 06 Feb 2003]
Added fixed packages for Advanced Workstation 2.1
Details
SMRSH (the SendMail Restricted SHell) is a /bin/sh replacement for
Sendmail. It provides the ability to limit the set of executable programs
available to Sendmail.
A bug in the version of smrsh packaged as part of Sendmail 8.12.6 and
8.11.6 allows attackers to bypass shrsh's intended restrictions. This
can be done by inserting additional commands after "||" or "/" characters,
which are not properly filtered or verified. A sucessful attack would
allow an attacker who has a local account on a system to execute arbitrary
binaries as themselves by utilizing their .forward file.
Because sendmail as shipped with Red Hat Linux Advanced Server is not
configured to use smrsh, this issue only affects users who have customized
their sendmail configuration to use smrsh.
Users who have configured sendmail to use smrsh should update to these
errata packages which contain a backported security fix, and are therefore
not vulnerable to this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "The sendmail packages shipped with Red Hat Linux Advanced Server have a\nsecurity bug if sendmail is configured to use smrsh. This security errata\nrelease fixes the problem.\n\n[Updated 06 Feb 2003]\nAdded fixed packages for Advanced Workstation 2.1", "title": "Topic" }, { "category": "general", "text": "SMRSH (the SendMail Restricted SHell) is a /bin/sh replacement for\nSendmail. It provides the ability to limit the set of executable programs\navailable to Sendmail.\n\nA bug in the version of smrsh packaged as part of Sendmail 8.12.6 and\n8.11.6 allows attackers to bypass shrsh\u0027s intended restrictions. This\ncan be done by inserting additional commands after \"||\" or \"/\" characters,\nwhich are not properly filtered or verified. A sucessful attack would\nallow an attacker who has a local account on a system to execute arbitrary\nbinaries as themselves by utilizing their .forward file.\n\nBecause sendmail as shipped with Red Hat Linux Advanced Server is not\nconfigured to use smrsh, this issue only affects users who have customized\ntheir sendmail configuration to use smrsh.\n\nUsers who have configured sendmail to use smrsh should update to these\nerrata packages which contain a backported security fix, and are therefore\nnot vulnerable to this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2002:259", "url": "https://access.redhat.com/errata/RHSA-2002:259" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=103350914307274", "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=103350914307274" }, { "category": "external", "summary": "77647", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=77647" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2003/rhsa-2002_259.json" } ], "title": "Red Hat Security Advisory: sendmail security update", "tracking": { "current_release_date": "2024-11-21T22:31:52+00:00", "generator": { "date": "2024-11-21T22:31:52+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2002:259", "initial_release_date": "2003-01-30T19:28:00+00:00", "revision_history": [ { "date": "2003-01-30T19:28:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2003-02-07T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T22:31:52+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product": { "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::as" } } }, { "category": "product_name", "name": "Red Hat Linux Advanced Workstation 2.1", "product": { "name": "Red Hat Linux Advanced Workstation 2.1", "product_id": "Red Hat Linux Advanced Workstation 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::aw" } } } ], "category": "product_family", "name": "Red Hat Advanced Products" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2002-1165", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616854" } ], "notes": [ { "category": "description", "text": "Sendmail Consortium\u0027s Restricted Shell (SMRSH) in Sendmail 8.12.6, 8.11.6-15, and possibly other versions after 8.11 from 5/19/1998, allows attackers to bypass the intended restrictions of smrsh by inserting additional commands after (1) \"||\" sequences or (2) \"/\" characters, which are not properly filtered or verified.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1165" }, { "category": "external", "summary": "RHBZ#1616854", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616854" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1165", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1165" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1165", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1165" } ], "release_date": "2002-10-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-01-30T19:28:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2002:259" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" } ] }
rhsa-2003:227
Vulnerability from csaf_redhat
Published
2003-07-08 20:37
Modified
2024-11-21 22:44
Summary
Red Hat Security Advisory: : : : Updated sendmail packages fix vulnerabilities
Notes
Topic
Updated Sendmail packages are available for Red Hat Linux on IBM iSeries
and pSeries systems to fix a vulnerability that allows local and possibly
remote attackers to gain root privileges as well as a vulnerability that
may allow remote attackers to gain root privileges by sending a
carefully crafted message.
These packages additionally fix a security bug if sendmail is configured to
use smrsh.
Details
Sendmail is a widely used Mail Transport Agent (MTA).
A vulnerability exists in unpatched Sendmail versions prior to and
including 8.12.8. The address parser performs insufficient bounds checking
in certain conditions due to a char to int conversion, making it possible
for an attacker to take control of the application. This issue is probably
locally exploitable and may also be remotely exploitable. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CAN-2003-0161 to this issue.
During a code audit of Sendmail by ISS, a critical vulnerability was
uncovered that affects unpatched versions of Sendmail prior to version
8.12.8. A remote attacker can send a carefully crafted email message
which, when processed by Sendmail, causes arbitrary code to be
executed as root. A proof-of-concept exploit is reported to exist, but is
not believed to be publicly available.
Since this vulnerability is message-based, MTAs other than Sendmail
may pass on the carefully crafted message. This means that unpatched
versions of Sendmail inside a network could still be at risk even if
they do not accept external connections directly. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CAN-2002-1337 to this issue.
In addition, the restricted shell (SMRSH) in Sendmail allows attackers to
bypass the intended restrictions of smrsh by inserting additional commands
after "||" sequences or "/" characters, which are not properly filtered or
verified. A successful attack would allow an attacker who has a local
account on a system which has explicitly enabled smrsh to execute arbitrary
binaries as themselves by utilizing their .forward file. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CAN-2002-1165 to this issue.
All users are advised to update to these erratum packages containing
backported patches which correct these vulnerabilities.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated Sendmail packages are available for Red Hat Linux on IBM iSeries\nand pSeries systems to fix a vulnerability that allows local and possibly\nremote attackers to gain root privileges as well as a vulnerability that\nmay allow remote attackers to gain root privileges by sending a\ncarefully crafted message.\n\nThese packages additionally fix a security bug if sendmail is configured to\nuse smrsh.", "title": "Topic" }, { "category": "general", "text": "Sendmail is a widely used Mail Transport Agent (MTA).\n\nA vulnerability exists in unpatched Sendmail versions prior to and\nincluding 8.12.8. The address parser performs insufficient bounds checking\nin certain conditions due to a char to int conversion, making it possible\nfor an attacker to take control of the application. This issue is probably\nlocally exploitable and may also be remotely exploitable. The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the name\nCAN-2003-0161 to this issue.\n\nDuring a code audit of Sendmail by ISS, a critical vulnerability was\nuncovered that affects unpatched versions of Sendmail prior to version\n8.12.8. A remote attacker can send a carefully crafted email message\nwhich, when processed by Sendmail, causes arbitrary code to be\nexecuted as root. A proof-of-concept exploit is reported to exist, but is\nnot believed to be publicly available.\n\nSince this vulnerability is message-based, MTAs other than Sendmail\nmay pass on the carefully crafted message. This means that unpatched\nversions of Sendmail inside a network could still be at risk even if\nthey do not accept external connections directly. The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the name\nCAN-2002-1337 to this issue.\n\nIn addition, the restricted shell (SMRSH) in Sendmail allows attackers to\nbypass the intended restrictions of smrsh by inserting additional commands\nafter \"||\" sequences or \"/\" characters, which are not properly filtered or\nverified. A successful attack would allow an attacker who has a local\naccount on a system which has explicitly enabled smrsh to execute arbitrary\nbinaries as themselves by utilizing their .forward file. The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the name\nCAN-2002-1165 to this issue.\n\nAll users are advised to update to these erratum packages containing\nbackported patches which correct these vulnerabilities.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2003:227", "url": "https://access.redhat.com/errata/RHSA-2003:227" }, { "category": "external", "summary": "http://www.cert.org/advisories/CA-2003-07.html", "url": "http://www.cert.org/advisories/CA-2003-07.html" }, { "category": "external", "summary": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=103350914307274", "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=103350914307274" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2003/rhsa-2003_227.json" } ], "title": "Red Hat Security Advisory: : : : Updated sendmail packages fix vulnerabilities", "tracking": { "current_release_date": "2024-11-21T22:44:02+00:00", "generator": { "date": "2024-11-21T22:44:02+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2003:227", "initial_release_date": "2003-07-08T20:37:00+00:00", "revision_history": [ { "date": "2003-07-08T20:37:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2003-07-08T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T22:44:02+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Linux 7.1", "product": { "name": "Red Hat Linux 7.1", "product_id": "Red Hat Linux 7.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:7.1" } } } ], "category": "product_family", "name": "Red Hat Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2002-1165", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616854" } ], "notes": [ { "category": "description", "text": "Sendmail Consortium\u0027s Restricted Shell (SMRSH) in Sendmail 8.12.6, 8.11.6-15, and possibly other versions after 8.11 from 5/19/1998, allows attackers to bypass the intended restrictions of smrsh by inserting additional commands after (1) \"||\" sequences or (2) \"/\" characters, which are not properly filtered or verified.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1165" }, { "category": "external", "summary": "RHBZ#1616854", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616854" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1165", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1165" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1165", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1165" } ], "release_date": "2002-10-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-07-08T20:37:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 7.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:227" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2002-1337", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616877" } ], "notes": [ { "category": "description", "text": "Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1337" }, { "category": "external", "summary": "RHBZ#1616877", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616877" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1337", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1337" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1337", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1337" } ], "release_date": "2003-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-07-08T20:37:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 7.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:227" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2003-0161", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616990" } ], "notes": [ { "category": "description", "text": "The prescan() function in the address parser (parseaddr.c) in Sendmail before 8.12.9 does not properly handle certain conversions from char and int types, which can cause a length check to be disabled when Sendmail misinterprets an input value as a special \"NOCHAR\" control value, allowing attackers to cause a denial of service and possibly execute arbitrary code via a buffer overflow attack using messages, a different vulnerability than CVE-2002-1337.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2003-0161" }, { "category": "external", "summary": "RHBZ#1616990", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616990" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2003-0161", "url": "https://www.cve.org/CVERecord?id=CVE-2003-0161" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2003-0161", "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-0161" } ], "release_date": "2003-03-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-07-08T20:37:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 7.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:227" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" } ] }
RHSA-2003:227
Vulnerability from csaf_redhat
Published
2003-07-08 20:37
Modified
2024-11-21 22:44
Summary
Red Hat Security Advisory: : : : Updated sendmail packages fix vulnerabilities
Notes
Topic
Updated Sendmail packages are available for Red Hat Linux on IBM iSeries
and pSeries systems to fix a vulnerability that allows local and possibly
remote attackers to gain root privileges as well as a vulnerability that
may allow remote attackers to gain root privileges by sending a
carefully crafted message.
These packages additionally fix a security bug if sendmail is configured to
use smrsh.
Details
Sendmail is a widely used Mail Transport Agent (MTA).
A vulnerability exists in unpatched Sendmail versions prior to and
including 8.12.8. The address parser performs insufficient bounds checking
in certain conditions due to a char to int conversion, making it possible
for an attacker to take control of the application. This issue is probably
locally exploitable and may also be remotely exploitable. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CAN-2003-0161 to this issue.
During a code audit of Sendmail by ISS, a critical vulnerability was
uncovered that affects unpatched versions of Sendmail prior to version
8.12.8. A remote attacker can send a carefully crafted email message
which, when processed by Sendmail, causes arbitrary code to be
executed as root. A proof-of-concept exploit is reported to exist, but is
not believed to be publicly available.
Since this vulnerability is message-based, MTAs other than Sendmail
may pass on the carefully crafted message. This means that unpatched
versions of Sendmail inside a network could still be at risk even if
they do not accept external connections directly. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CAN-2002-1337 to this issue.
In addition, the restricted shell (SMRSH) in Sendmail allows attackers to
bypass the intended restrictions of smrsh by inserting additional commands
after "||" sequences or "/" characters, which are not properly filtered or
verified. A successful attack would allow an attacker who has a local
account on a system which has explicitly enabled smrsh to execute arbitrary
binaries as themselves by utilizing their .forward file. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CAN-2002-1165 to this issue.
All users are advised to update to these erratum packages containing
backported patches which correct these vulnerabilities.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated Sendmail packages are available for Red Hat Linux on IBM iSeries\nand pSeries systems to fix a vulnerability that allows local and possibly\nremote attackers to gain root privileges as well as a vulnerability that\nmay allow remote attackers to gain root privileges by sending a\ncarefully crafted message.\n\nThese packages additionally fix a security bug if sendmail is configured to\nuse smrsh.", "title": "Topic" }, { "category": "general", "text": "Sendmail is a widely used Mail Transport Agent (MTA).\n\nA vulnerability exists in unpatched Sendmail versions prior to and\nincluding 8.12.8. The address parser performs insufficient bounds checking\nin certain conditions due to a char to int conversion, making it possible\nfor an attacker to take control of the application. This issue is probably\nlocally exploitable and may also be remotely exploitable. The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the name\nCAN-2003-0161 to this issue.\n\nDuring a code audit of Sendmail by ISS, a critical vulnerability was\nuncovered that affects unpatched versions of Sendmail prior to version\n8.12.8. A remote attacker can send a carefully crafted email message\nwhich, when processed by Sendmail, causes arbitrary code to be\nexecuted as root. A proof-of-concept exploit is reported to exist, but is\nnot believed to be publicly available.\n\nSince this vulnerability is message-based, MTAs other than Sendmail\nmay pass on the carefully crafted message. This means that unpatched\nversions of Sendmail inside a network could still be at risk even if\nthey do not accept external connections directly. The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the name\nCAN-2002-1337 to this issue.\n\nIn addition, the restricted shell (SMRSH) in Sendmail allows attackers to\nbypass the intended restrictions of smrsh by inserting additional commands\nafter \"||\" sequences or \"/\" characters, which are not properly filtered or\nverified. A successful attack would allow an attacker who has a local\naccount on a system which has explicitly enabled smrsh to execute arbitrary\nbinaries as themselves by utilizing their .forward file. The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the name\nCAN-2002-1165 to this issue.\n\nAll users are advised to update to these erratum packages containing\nbackported patches which correct these vulnerabilities.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2003:227", "url": "https://access.redhat.com/errata/RHSA-2003:227" }, { "category": "external", "summary": "http://www.cert.org/advisories/CA-2003-07.html", "url": "http://www.cert.org/advisories/CA-2003-07.html" }, { "category": "external", "summary": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=103350914307274", "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=103350914307274" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2003/rhsa-2003_227.json" } ], "title": "Red Hat Security Advisory: : : : Updated sendmail packages fix vulnerabilities", "tracking": { "current_release_date": "2024-11-21T22:44:02+00:00", "generator": { "date": "2024-11-21T22:44:02+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2003:227", "initial_release_date": "2003-07-08T20:37:00+00:00", "revision_history": [ { "date": "2003-07-08T20:37:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2003-07-08T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T22:44:02+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Linux 7.1", "product": { "name": "Red Hat Linux 7.1", "product_id": "Red Hat Linux 7.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:7.1" } } } ], "category": "product_family", "name": "Red Hat Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2002-1165", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616854" } ], "notes": [ { "category": "description", "text": "Sendmail Consortium\u0027s Restricted Shell (SMRSH) in Sendmail 8.12.6, 8.11.6-15, and possibly other versions after 8.11 from 5/19/1998, allows attackers to bypass the intended restrictions of smrsh by inserting additional commands after (1) \"||\" sequences or (2) \"/\" characters, which are not properly filtered or verified.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1165" }, { "category": "external", "summary": "RHBZ#1616854", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616854" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1165", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1165" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1165", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1165" } ], "release_date": "2002-10-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-07-08T20:37:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 7.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:227" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2002-1337", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616877" } ], "notes": [ { "category": "description", "text": "Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1337" }, { "category": "external", "summary": "RHBZ#1616877", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616877" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1337", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1337" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1337", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1337" } ], "release_date": "2003-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-07-08T20:37:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 7.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:227" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2003-0161", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616990" } ], "notes": [ { "category": "description", "text": "The prescan() function in the address parser (parseaddr.c) in Sendmail before 8.12.9 does not properly handle certain conversions from char and int types, which can cause a length check to be disabled when Sendmail misinterprets an input value as a special \"NOCHAR\" control value, allowing attackers to cause a denial of service and possibly execute arbitrary code via a buffer overflow attack using messages, a different vulnerability than CVE-2002-1337.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2003-0161" }, { "category": "external", "summary": "RHBZ#1616990", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616990" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2003-0161", "url": "https://www.cve.org/CVERecord?id=CVE-2003-0161" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2003-0161", "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-0161" } ], "release_date": "2003-03-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-07-08T20:37:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 7.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:227" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" } ] }
rhsa-2002_259
Vulnerability from csaf_redhat
Published
2003-01-30 19:28
Modified
2024-11-21 22:31
Summary
Red Hat Security Advisory: sendmail security update
Notes
Topic
The sendmail packages shipped with Red Hat Linux Advanced Server have a
security bug if sendmail is configured to use smrsh. This security errata
release fixes the problem.
[Updated 06 Feb 2003]
Added fixed packages for Advanced Workstation 2.1
Details
SMRSH (the SendMail Restricted SHell) is a /bin/sh replacement for
Sendmail. It provides the ability to limit the set of executable programs
available to Sendmail.
A bug in the version of smrsh packaged as part of Sendmail 8.12.6 and
8.11.6 allows attackers to bypass shrsh's intended restrictions. This
can be done by inserting additional commands after "||" or "/" characters,
which are not properly filtered or verified. A sucessful attack would
allow an attacker who has a local account on a system to execute arbitrary
binaries as themselves by utilizing their .forward file.
Because sendmail as shipped with Red Hat Linux Advanced Server is not
configured to use smrsh, this issue only affects users who have customized
their sendmail configuration to use smrsh.
Users who have configured sendmail to use smrsh should update to these
errata packages which contain a backported security fix, and are therefore
not vulnerable to this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "The sendmail packages shipped with Red Hat Linux Advanced Server have a\nsecurity bug if sendmail is configured to use smrsh. This security errata\nrelease fixes the problem.\n\n[Updated 06 Feb 2003]\nAdded fixed packages for Advanced Workstation 2.1", "title": "Topic" }, { "category": "general", "text": "SMRSH (the SendMail Restricted SHell) is a /bin/sh replacement for\nSendmail. It provides the ability to limit the set of executable programs\navailable to Sendmail.\n\nA bug in the version of smrsh packaged as part of Sendmail 8.12.6 and\n8.11.6 allows attackers to bypass shrsh\u0027s intended restrictions. This\ncan be done by inserting additional commands after \"||\" or \"/\" characters,\nwhich are not properly filtered or verified. A sucessful attack would\nallow an attacker who has a local account on a system to execute arbitrary\nbinaries as themselves by utilizing their .forward file.\n\nBecause sendmail as shipped with Red Hat Linux Advanced Server is not\nconfigured to use smrsh, this issue only affects users who have customized\ntheir sendmail configuration to use smrsh.\n\nUsers who have configured sendmail to use smrsh should update to these\nerrata packages which contain a backported security fix, and are therefore\nnot vulnerable to this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2002:259", "url": "https://access.redhat.com/errata/RHSA-2002:259" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=103350914307274", "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=103350914307274" }, { "category": "external", "summary": "77647", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=77647" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2003/rhsa-2002_259.json" } ], "title": "Red Hat Security Advisory: sendmail security update", "tracking": { "current_release_date": "2024-11-21T22:31:52+00:00", "generator": { "date": "2024-11-21T22:31:52+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2002:259", "initial_release_date": "2003-01-30T19:28:00+00:00", "revision_history": [ { "date": "2003-01-30T19:28:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2003-02-07T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T22:31:52+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product": { "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::as" } } }, { "category": "product_name", "name": "Red Hat Linux Advanced Workstation 2.1", "product": { "name": "Red Hat Linux Advanced Workstation 2.1", "product_id": "Red Hat Linux Advanced Workstation 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::aw" } } } ], "category": "product_family", "name": "Red Hat Advanced Products" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2002-1165", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616854" } ], "notes": [ { "category": "description", "text": "Sendmail Consortium\u0027s Restricted Shell (SMRSH) in Sendmail 8.12.6, 8.11.6-15, and possibly other versions after 8.11 from 5/19/1998, allows attackers to bypass the intended restrictions of smrsh by inserting additional commands after (1) \"||\" sequences or (2) \"/\" characters, which are not properly filtered or verified.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1165" }, { "category": "external", "summary": "RHBZ#1616854", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616854" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1165", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1165" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1165", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1165" } ], "release_date": "2002-10-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-01-30T19:28:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2002:259" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" } ] }
rhsa-2003_073
Vulnerability from csaf_redhat
Published
2003-03-03 17:04
Modified
2024-11-21 22:40
Summary
Red Hat Security Advisory: : Updated sendmail packages fix critical security issues
Notes
Topic
Updated Sendmail packages are available to fix a vulnerability that
may allow remote attackers to gain root privileges by sending a
carefully crafted message.
These packages also fix a security bug if sendmail is configured to use smrsh.
Details
Sendmail is a widely used Mail Transport Agent (MTA) which is included
in all Red Hat Linux distributions.
During a code audit of Sendmail by ISS, a critical vulnerability was
uncovered that affects unpatched versions of Sendmail prior to version
8.12.8. A remote attacker can send a carefully crafted email message
which, when processed by sendmail, causes arbitrary code to be
executed as root.
We are advised that a proof-of-concept exploit is known to exist, but
is not believed to be in the wild.
Since this is a message-based vulnerability, MTAs other than Sendmail
may pass on the carefully crafted message. This means that unpatched
versions of Sendmail inside a network could still be at risk even if
they do not accept external connections directly.
In addition, the restricted shell (SMRSH) in Sendmail allows attackers to
bypass the intended restrictions of smrsh by inserting additional commands
after "||" sequences or "/" characters, which are not properly filtered or
verified. A sucessful attack would allow an attacker who has a local
account on a system which has explicitly enabled smrsh to execute arbitrary
binaries as themselves by utilizing their .forward file.
All users are advised to update to these erratum packages. For Red Hat
Linux 8.0 we have included Sendmail version 8.12.8 which is not vulnerable
to these issues. For all other distributions we have included a backported
patch which corrects these vulnerabilities.
Red Hat would like to thank Eric Allman for his assistance with this
vulnerability.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated Sendmail packages are available to fix a vulnerability that\nmay allow remote attackers to gain root privileges by sending a\ncarefully crafted message.\n\nThese packages also fix a security bug if sendmail is configured to use smrsh.", "title": "Topic" }, { "category": "general", "text": "Sendmail is a widely used Mail Transport Agent (MTA) which is included\nin all Red Hat Linux distributions.\n\nDuring a code audit of Sendmail by ISS, a critical vulnerability was\nuncovered that affects unpatched versions of Sendmail prior to version\n8.12.8. A remote attacker can send a carefully crafted email message\nwhich, when processed by sendmail, causes arbitrary code to be\nexecuted as root.\n\nWe are advised that a proof-of-concept exploit is known to exist, but\nis not believed to be in the wild.\n\nSince this is a message-based vulnerability, MTAs other than Sendmail\nmay pass on the carefully crafted message. This means that unpatched\nversions of Sendmail inside a network could still be at risk even if\nthey do not accept external connections directly.\n\nIn addition, the restricted shell (SMRSH) in Sendmail allows attackers to\nbypass the intended restrictions of smrsh by inserting additional commands\nafter \"||\" sequences or \"/\" characters, which are not properly filtered or\nverified. A sucessful attack would allow an attacker who has a local\naccount on a system which has explicitly enabled smrsh to execute arbitrary\nbinaries as themselves by utilizing their .forward file. \n\nAll users are advised to update to these erratum packages. For Red Hat\nLinux 8.0 we have included Sendmail version 8.12.8 which is not vulnerable\nto these issues. For all other distributions we have included a backported\npatch which corrects these vulnerabilities.\n\nRed Hat would like to thank Eric Allman for his assistance with this\nvulnerability.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2003:073", "url": "https://access.redhat.com/errata/RHSA-2003:073" }, { "category": "external", "summary": "http://www.cert.org/advisories/CA-2003-07.html", "url": "http://www.cert.org/advisories/CA-2003-07.html" }, { "category": "external", "summary": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=103350914307274", "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=103350914307274" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2003/rhsa-2003_073.json" } ], "title": "Red Hat Security Advisory: : Updated sendmail packages fix critical security issues", "tracking": { "current_release_date": "2024-11-21T22:40:25+00:00", "generator": { "date": "2024-11-21T22:40:25+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2003:073", "initial_release_date": "2003-03-03T17:04:00+00:00", "revision_history": [ { "date": "2003-03-03T17:04:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2003-02-07T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T22:40:25+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Linux 6.2", "product": { "name": "Red Hat Linux 6.2", "product_id": "Red Hat Linux 6.2", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:6.2" } } }, { "category": "product_name", "name": "Red Hat Linux 7.0", "product": { "name": "Red Hat Linux 7.0", "product_id": "Red Hat Linux 7.0", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:7.0" } } }, { "category": "product_name", "name": "Red Hat Linux 7.1", "product": { "name": "Red Hat Linux 7.1", "product_id": "Red Hat Linux 7.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:7.1" } } }, { "category": "product_name", "name": "Red Hat Linux 7.2", "product": { "name": "Red Hat Linux 7.2", "product_id": "Red Hat Linux 7.2", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:7.2" } } }, { "category": "product_name", "name": "Red Hat Linux 7.3", "product": { "name": "Red Hat Linux 7.3", "product_id": "Red Hat Linux 7.3", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:7.3" } } }, { "category": "product_name", "name": "Red Hat Linux 8.0", "product": { "name": "Red Hat Linux 8.0", "product_id": "Red Hat Linux 8.0", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:8.0" } } } ], "category": "product_family", "name": "Red Hat Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2002-1165", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616854" } ], "notes": [ { "category": "description", "text": "Sendmail Consortium\u0027s Restricted Shell (SMRSH) in Sendmail 8.12.6, 8.11.6-15, and possibly other versions after 8.11 from 5/19/1998, allows attackers to bypass the intended restrictions of smrsh by inserting additional commands after (1) \"||\" sequences or (2) \"/\" characters, which are not properly filtered or verified.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1165" }, { "category": "external", "summary": "RHBZ#1616854", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616854" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1165", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1165" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1165", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1165" } ], "release_date": "2002-10-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-03-03T17:04:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:073" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2002-1337", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616877" } ], "notes": [ { "category": "description", "text": "Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1337" }, { "category": "external", "summary": "RHBZ#1616877", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616877" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1337", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1337" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1337", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1337" } ], "release_date": "2003-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-03-03T17:04:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:073" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" } ] }
RHSA-2002:259
Vulnerability from csaf_redhat
Published
2003-01-30 19:28
Modified
2024-11-21 22:31
Summary
Red Hat Security Advisory: sendmail security update
Notes
Topic
The sendmail packages shipped with Red Hat Linux Advanced Server have a
security bug if sendmail is configured to use smrsh. This security errata
release fixes the problem.
[Updated 06 Feb 2003]
Added fixed packages for Advanced Workstation 2.1
Details
SMRSH (the SendMail Restricted SHell) is a /bin/sh replacement for
Sendmail. It provides the ability to limit the set of executable programs
available to Sendmail.
A bug in the version of smrsh packaged as part of Sendmail 8.12.6 and
8.11.6 allows attackers to bypass shrsh's intended restrictions. This
can be done by inserting additional commands after "||" or "/" characters,
which are not properly filtered or verified. A sucessful attack would
allow an attacker who has a local account on a system to execute arbitrary
binaries as themselves by utilizing their .forward file.
Because sendmail as shipped with Red Hat Linux Advanced Server is not
configured to use smrsh, this issue only affects users who have customized
their sendmail configuration to use smrsh.
Users who have configured sendmail to use smrsh should update to these
errata packages which contain a backported security fix, and are therefore
not vulnerable to this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "The sendmail packages shipped with Red Hat Linux Advanced Server have a\nsecurity bug if sendmail is configured to use smrsh. This security errata\nrelease fixes the problem.\n\n[Updated 06 Feb 2003]\nAdded fixed packages for Advanced Workstation 2.1", "title": "Topic" }, { "category": "general", "text": "SMRSH (the SendMail Restricted SHell) is a /bin/sh replacement for\nSendmail. It provides the ability to limit the set of executable programs\navailable to Sendmail.\n\nA bug in the version of smrsh packaged as part of Sendmail 8.12.6 and\n8.11.6 allows attackers to bypass shrsh\u0027s intended restrictions. This\ncan be done by inserting additional commands after \"||\" or \"/\" characters,\nwhich are not properly filtered or verified. A sucessful attack would\nallow an attacker who has a local account on a system to execute arbitrary\nbinaries as themselves by utilizing their .forward file.\n\nBecause sendmail as shipped with Red Hat Linux Advanced Server is not\nconfigured to use smrsh, this issue only affects users who have customized\ntheir sendmail configuration to use smrsh.\n\nUsers who have configured sendmail to use smrsh should update to these\nerrata packages which contain a backported security fix, and are therefore\nnot vulnerable to this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2002:259", "url": "https://access.redhat.com/errata/RHSA-2002:259" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=103350914307274", "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=103350914307274" }, { "category": "external", "summary": "77647", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=77647" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2003/rhsa-2002_259.json" } ], "title": "Red Hat Security Advisory: sendmail security update", "tracking": { "current_release_date": "2024-11-21T22:31:52+00:00", "generator": { "date": "2024-11-21T22:31:52+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2002:259", "initial_release_date": "2003-01-30T19:28:00+00:00", "revision_history": [ { "date": "2003-01-30T19:28:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2003-02-07T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T22:31:52+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product": { "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::as" } } }, { "category": "product_name", "name": "Red Hat Linux Advanced Workstation 2.1", "product": { "name": "Red Hat Linux Advanced Workstation 2.1", "product_id": "Red Hat Linux Advanced Workstation 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::aw" } } } ], "category": "product_family", "name": "Red Hat Advanced Products" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2002-1165", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616854" } ], "notes": [ { "category": "description", "text": "Sendmail Consortium\u0027s Restricted Shell (SMRSH) in Sendmail 8.12.6, 8.11.6-15, and possibly other versions after 8.11 from 5/19/1998, allows attackers to bypass the intended restrictions of smrsh by inserting additional commands after (1) \"||\" sequences or (2) \"/\" characters, which are not properly filtered or verified.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1165" }, { "category": "external", "summary": "RHBZ#1616854", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616854" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1165", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1165" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1165", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1165" } ], "release_date": "2002-10-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-01-30T19:28:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2002:259" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" } ] }
RHSA-2003:073
Vulnerability from csaf_redhat
Published
2003-03-03 17:04
Modified
2024-11-21 22:40
Summary
Red Hat Security Advisory: : Updated sendmail packages fix critical security issues
Notes
Topic
Updated Sendmail packages are available to fix a vulnerability that
may allow remote attackers to gain root privileges by sending a
carefully crafted message.
These packages also fix a security bug if sendmail is configured to use smrsh.
Details
Sendmail is a widely used Mail Transport Agent (MTA) which is included
in all Red Hat Linux distributions.
During a code audit of Sendmail by ISS, a critical vulnerability was
uncovered that affects unpatched versions of Sendmail prior to version
8.12.8. A remote attacker can send a carefully crafted email message
which, when processed by sendmail, causes arbitrary code to be
executed as root.
We are advised that a proof-of-concept exploit is known to exist, but
is not believed to be in the wild.
Since this is a message-based vulnerability, MTAs other than Sendmail
may pass on the carefully crafted message. This means that unpatched
versions of Sendmail inside a network could still be at risk even if
they do not accept external connections directly.
In addition, the restricted shell (SMRSH) in Sendmail allows attackers to
bypass the intended restrictions of smrsh by inserting additional commands
after "||" sequences or "/" characters, which are not properly filtered or
verified. A sucessful attack would allow an attacker who has a local
account on a system which has explicitly enabled smrsh to execute arbitrary
binaries as themselves by utilizing their .forward file.
All users are advised to update to these erratum packages. For Red Hat
Linux 8.0 we have included Sendmail version 8.12.8 which is not vulnerable
to these issues. For all other distributions we have included a backported
patch which corrects these vulnerabilities.
Red Hat would like to thank Eric Allman for his assistance with this
vulnerability.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated Sendmail packages are available to fix a vulnerability that\nmay allow remote attackers to gain root privileges by sending a\ncarefully crafted message.\n\nThese packages also fix a security bug if sendmail is configured to use smrsh.", "title": "Topic" }, { "category": "general", "text": "Sendmail is a widely used Mail Transport Agent (MTA) which is included\nin all Red Hat Linux distributions.\n\nDuring a code audit of Sendmail by ISS, a critical vulnerability was\nuncovered that affects unpatched versions of Sendmail prior to version\n8.12.8. A remote attacker can send a carefully crafted email message\nwhich, when processed by sendmail, causes arbitrary code to be\nexecuted as root.\n\nWe are advised that a proof-of-concept exploit is known to exist, but\nis not believed to be in the wild.\n\nSince this is a message-based vulnerability, MTAs other than Sendmail\nmay pass on the carefully crafted message. This means that unpatched\nversions of Sendmail inside a network could still be at risk even if\nthey do not accept external connections directly.\n\nIn addition, the restricted shell (SMRSH) in Sendmail allows attackers to\nbypass the intended restrictions of smrsh by inserting additional commands\nafter \"||\" sequences or \"/\" characters, which are not properly filtered or\nverified. A sucessful attack would allow an attacker who has a local\naccount on a system which has explicitly enabled smrsh to execute arbitrary\nbinaries as themselves by utilizing their .forward file. \n\nAll users are advised to update to these erratum packages. For Red Hat\nLinux 8.0 we have included Sendmail version 8.12.8 which is not vulnerable\nto these issues. For all other distributions we have included a backported\npatch which corrects these vulnerabilities.\n\nRed Hat would like to thank Eric Allman for his assistance with this\nvulnerability.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2003:073", "url": "https://access.redhat.com/errata/RHSA-2003:073" }, { "category": "external", "summary": "http://www.cert.org/advisories/CA-2003-07.html", "url": "http://www.cert.org/advisories/CA-2003-07.html" }, { "category": "external", "summary": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=103350914307274", "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=103350914307274" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2003/rhsa-2003_073.json" } ], "title": "Red Hat Security Advisory: : Updated sendmail packages fix critical security issues", "tracking": { "current_release_date": "2024-11-21T22:40:25+00:00", "generator": { "date": "2024-11-21T22:40:25+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2003:073", "initial_release_date": "2003-03-03T17:04:00+00:00", "revision_history": [ { "date": "2003-03-03T17:04:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2003-02-07T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T22:40:25+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Linux 6.2", "product": { "name": "Red Hat Linux 6.2", "product_id": "Red Hat Linux 6.2", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:6.2" } } }, { "category": "product_name", "name": "Red Hat Linux 7.0", "product": { "name": "Red Hat Linux 7.0", "product_id": "Red Hat Linux 7.0", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:7.0" } } }, { "category": "product_name", "name": "Red Hat Linux 7.1", "product": { "name": "Red Hat Linux 7.1", "product_id": "Red Hat Linux 7.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:7.1" } } }, { "category": "product_name", "name": "Red Hat Linux 7.2", "product": { "name": "Red Hat Linux 7.2", "product_id": "Red Hat Linux 7.2", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:7.2" } } }, { "category": "product_name", "name": "Red Hat Linux 7.3", "product": { "name": "Red Hat Linux 7.3", "product_id": "Red Hat Linux 7.3", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:7.3" } } }, { "category": "product_name", "name": "Red Hat Linux 8.0", "product": { "name": "Red Hat Linux 8.0", "product_id": "Red Hat Linux 8.0", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:8.0" } } } ], "category": "product_family", "name": "Red Hat Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2002-1165", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616854" } ], "notes": [ { "category": "description", "text": "Sendmail Consortium\u0027s Restricted Shell (SMRSH) in Sendmail 8.12.6, 8.11.6-15, and possibly other versions after 8.11 from 5/19/1998, allows attackers to bypass the intended restrictions of smrsh by inserting additional commands after (1) \"||\" sequences or (2) \"/\" characters, which are not properly filtered or verified.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1165" }, { "category": "external", "summary": "RHBZ#1616854", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616854" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1165", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1165" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1165", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1165" } ], "release_date": "2002-10-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-03-03T17:04:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:073" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2002-1337", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616877" } ], "notes": [ { "category": "description", "text": "Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1337" }, { "category": "external", "summary": "RHBZ#1616877", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616877" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1337", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1337" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1337", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1337" } ], "release_date": "2003-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-03-03T17:04:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:073" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" } ] }
rhsa-2003_227
Vulnerability from csaf_redhat
Published
2003-07-08 20:37
Modified
2024-11-21 22:44
Summary
Red Hat Security Advisory: : : : Updated sendmail packages fix vulnerabilities
Notes
Topic
Updated Sendmail packages are available for Red Hat Linux on IBM iSeries
and pSeries systems to fix a vulnerability that allows local and possibly
remote attackers to gain root privileges as well as a vulnerability that
may allow remote attackers to gain root privileges by sending a
carefully crafted message.
These packages additionally fix a security bug if sendmail is configured to
use smrsh.
Details
Sendmail is a widely used Mail Transport Agent (MTA).
A vulnerability exists in unpatched Sendmail versions prior to and
including 8.12.8. The address parser performs insufficient bounds checking
in certain conditions due to a char to int conversion, making it possible
for an attacker to take control of the application. This issue is probably
locally exploitable and may also be remotely exploitable. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CAN-2003-0161 to this issue.
During a code audit of Sendmail by ISS, a critical vulnerability was
uncovered that affects unpatched versions of Sendmail prior to version
8.12.8. A remote attacker can send a carefully crafted email message
which, when processed by Sendmail, causes arbitrary code to be
executed as root. A proof-of-concept exploit is reported to exist, but is
not believed to be publicly available.
Since this vulnerability is message-based, MTAs other than Sendmail
may pass on the carefully crafted message. This means that unpatched
versions of Sendmail inside a network could still be at risk even if
they do not accept external connections directly. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CAN-2002-1337 to this issue.
In addition, the restricted shell (SMRSH) in Sendmail allows attackers to
bypass the intended restrictions of smrsh by inserting additional commands
after "||" sequences or "/" characters, which are not properly filtered or
verified. A successful attack would allow an attacker who has a local
account on a system which has explicitly enabled smrsh to execute arbitrary
binaries as themselves by utilizing their .forward file. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CAN-2002-1165 to this issue.
All users are advised to update to these erratum packages containing
backported patches which correct these vulnerabilities.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated Sendmail packages are available for Red Hat Linux on IBM iSeries\nand pSeries systems to fix a vulnerability that allows local and possibly\nremote attackers to gain root privileges as well as a vulnerability that\nmay allow remote attackers to gain root privileges by sending a\ncarefully crafted message.\n\nThese packages additionally fix a security bug if sendmail is configured to\nuse smrsh.", "title": "Topic" }, { "category": "general", "text": "Sendmail is a widely used Mail Transport Agent (MTA).\n\nA vulnerability exists in unpatched Sendmail versions prior to and\nincluding 8.12.8. The address parser performs insufficient bounds checking\nin certain conditions due to a char to int conversion, making it possible\nfor an attacker to take control of the application. This issue is probably\nlocally exploitable and may also be remotely exploitable. The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the name\nCAN-2003-0161 to this issue.\n\nDuring a code audit of Sendmail by ISS, a critical vulnerability was\nuncovered that affects unpatched versions of Sendmail prior to version\n8.12.8. A remote attacker can send a carefully crafted email message\nwhich, when processed by Sendmail, causes arbitrary code to be\nexecuted as root. A proof-of-concept exploit is reported to exist, but is\nnot believed to be publicly available.\n\nSince this vulnerability is message-based, MTAs other than Sendmail\nmay pass on the carefully crafted message. This means that unpatched\nversions of Sendmail inside a network could still be at risk even if\nthey do not accept external connections directly. The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the name\nCAN-2002-1337 to this issue.\n\nIn addition, the restricted shell (SMRSH) in Sendmail allows attackers to\nbypass the intended restrictions of smrsh by inserting additional commands\nafter \"||\" sequences or \"/\" characters, which are not properly filtered or\nverified. A successful attack would allow an attacker who has a local\naccount on a system which has explicitly enabled smrsh to execute arbitrary\nbinaries as themselves by utilizing their .forward file. The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the name\nCAN-2002-1165 to this issue.\n\nAll users are advised to update to these erratum packages containing\nbackported patches which correct these vulnerabilities.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2003:227", "url": "https://access.redhat.com/errata/RHSA-2003:227" }, { "category": "external", "summary": "http://www.cert.org/advisories/CA-2003-07.html", "url": "http://www.cert.org/advisories/CA-2003-07.html" }, { "category": "external", "summary": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=103350914307274", "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=103350914307274" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2003/rhsa-2003_227.json" } ], "title": "Red Hat Security Advisory: : : : Updated sendmail packages fix vulnerabilities", "tracking": { "current_release_date": "2024-11-21T22:44:02+00:00", "generator": { "date": "2024-11-21T22:44:02+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2003:227", "initial_release_date": "2003-07-08T20:37:00+00:00", "revision_history": [ { "date": "2003-07-08T20:37:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2003-07-08T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T22:44:02+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Linux 7.1", "product": { "name": "Red Hat Linux 7.1", "product_id": "Red Hat Linux 7.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:7.1" } } } ], "category": "product_family", "name": "Red Hat Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2002-1165", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616854" } ], "notes": [ { "category": "description", "text": "Sendmail Consortium\u0027s Restricted Shell (SMRSH) in Sendmail 8.12.6, 8.11.6-15, and possibly other versions after 8.11 from 5/19/1998, allows attackers to bypass the intended restrictions of smrsh by inserting additional commands after (1) \"||\" sequences or (2) \"/\" characters, which are not properly filtered or verified.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1165" }, { "category": "external", "summary": "RHBZ#1616854", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616854" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1165", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1165" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1165", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1165" } ], "release_date": "2002-10-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-07-08T20:37:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 7.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:227" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2002-1337", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616877" } ], "notes": [ { "category": "description", "text": "Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1337" }, { "category": "external", "summary": "RHBZ#1616877", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616877" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1337", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1337" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1337", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1337" } ], "release_date": "2003-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-07-08T20:37:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 7.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:227" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2003-0161", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616990" } ], "notes": [ { "category": "description", "text": "The prescan() function in the address parser (parseaddr.c) in Sendmail before 8.12.9 does not properly handle certain conversions from char and int types, which can cause a length check to be disabled when Sendmail misinterprets an input value as a special \"NOCHAR\" control value, allowing attackers to cause a denial of service and possibly execute arbitrary code via a buffer overflow attack using messages, a different vulnerability than CVE-2002-1337.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2003-0161" }, { "category": "external", "summary": "RHBZ#1616990", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616990" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2003-0161", "url": "https://www.cve.org/CVERecord?id=CVE-2003-0161" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2003-0161", "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-0161" } ], "release_date": "2003-03-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-07-08T20:37:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 7.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:227" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" } ] }
rhsa-2003:073
Vulnerability from csaf_redhat
Published
2003-03-03 17:04
Modified
2024-11-21 22:40
Summary
Red Hat Security Advisory: : Updated sendmail packages fix critical security issues
Notes
Topic
Updated Sendmail packages are available to fix a vulnerability that
may allow remote attackers to gain root privileges by sending a
carefully crafted message.
These packages also fix a security bug if sendmail is configured to use smrsh.
Details
Sendmail is a widely used Mail Transport Agent (MTA) which is included
in all Red Hat Linux distributions.
During a code audit of Sendmail by ISS, a critical vulnerability was
uncovered that affects unpatched versions of Sendmail prior to version
8.12.8. A remote attacker can send a carefully crafted email message
which, when processed by sendmail, causes arbitrary code to be
executed as root.
We are advised that a proof-of-concept exploit is known to exist, but
is not believed to be in the wild.
Since this is a message-based vulnerability, MTAs other than Sendmail
may pass on the carefully crafted message. This means that unpatched
versions of Sendmail inside a network could still be at risk even if
they do not accept external connections directly.
In addition, the restricted shell (SMRSH) in Sendmail allows attackers to
bypass the intended restrictions of smrsh by inserting additional commands
after "||" sequences or "/" characters, which are not properly filtered or
verified. A sucessful attack would allow an attacker who has a local
account on a system which has explicitly enabled smrsh to execute arbitrary
binaries as themselves by utilizing their .forward file.
All users are advised to update to these erratum packages. For Red Hat
Linux 8.0 we have included Sendmail version 8.12.8 which is not vulnerable
to these issues. For all other distributions we have included a backported
patch which corrects these vulnerabilities.
Red Hat would like to thank Eric Allman for his assistance with this
vulnerability.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated Sendmail packages are available to fix a vulnerability that\nmay allow remote attackers to gain root privileges by sending a\ncarefully crafted message.\n\nThese packages also fix a security bug if sendmail is configured to use smrsh.", "title": "Topic" }, { "category": "general", "text": "Sendmail is a widely used Mail Transport Agent (MTA) which is included\nin all Red Hat Linux distributions.\n\nDuring a code audit of Sendmail by ISS, a critical vulnerability was\nuncovered that affects unpatched versions of Sendmail prior to version\n8.12.8. A remote attacker can send a carefully crafted email message\nwhich, when processed by sendmail, causes arbitrary code to be\nexecuted as root.\n\nWe are advised that a proof-of-concept exploit is known to exist, but\nis not believed to be in the wild.\n\nSince this is a message-based vulnerability, MTAs other than Sendmail\nmay pass on the carefully crafted message. This means that unpatched\nversions of Sendmail inside a network could still be at risk even if\nthey do not accept external connections directly.\n\nIn addition, the restricted shell (SMRSH) in Sendmail allows attackers to\nbypass the intended restrictions of smrsh by inserting additional commands\nafter \"||\" sequences or \"/\" characters, which are not properly filtered or\nverified. A sucessful attack would allow an attacker who has a local\naccount on a system which has explicitly enabled smrsh to execute arbitrary\nbinaries as themselves by utilizing their .forward file. \n\nAll users are advised to update to these erratum packages. For Red Hat\nLinux 8.0 we have included Sendmail version 8.12.8 which is not vulnerable\nto these issues. For all other distributions we have included a backported\npatch which corrects these vulnerabilities.\n\nRed Hat would like to thank Eric Allman for his assistance with this\nvulnerability.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2003:073", "url": "https://access.redhat.com/errata/RHSA-2003:073" }, { "category": "external", "summary": "http://www.cert.org/advisories/CA-2003-07.html", "url": "http://www.cert.org/advisories/CA-2003-07.html" }, { "category": "external", "summary": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=103350914307274", "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=103350914307274" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2003/rhsa-2003_073.json" } ], "title": "Red Hat Security Advisory: : Updated sendmail packages fix critical security issues", "tracking": { "current_release_date": "2024-11-21T22:40:25+00:00", "generator": { "date": "2024-11-21T22:40:25+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2003:073", "initial_release_date": "2003-03-03T17:04:00+00:00", "revision_history": [ { "date": "2003-03-03T17:04:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2003-02-07T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T22:40:25+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Linux 6.2", "product": { "name": "Red Hat Linux 6.2", "product_id": "Red Hat Linux 6.2", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:6.2" } } }, { "category": "product_name", "name": "Red Hat Linux 7.0", "product": { "name": "Red Hat Linux 7.0", "product_id": "Red Hat Linux 7.0", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:7.0" } } }, { "category": "product_name", "name": "Red Hat Linux 7.1", "product": { "name": "Red Hat Linux 7.1", "product_id": "Red Hat Linux 7.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:7.1" } } }, { "category": "product_name", "name": "Red Hat Linux 7.2", "product": { "name": "Red Hat Linux 7.2", "product_id": "Red Hat Linux 7.2", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:7.2" } } }, { "category": "product_name", "name": "Red Hat Linux 7.3", "product": { "name": "Red Hat Linux 7.3", "product_id": "Red Hat Linux 7.3", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:7.3" } } }, { "category": "product_name", "name": "Red Hat Linux 8.0", "product": { "name": "Red Hat Linux 8.0", "product_id": "Red Hat Linux 8.0", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:8.0" } } } ], "category": "product_family", "name": "Red Hat Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2002-1165", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616854" } ], "notes": [ { "category": "description", "text": "Sendmail Consortium\u0027s Restricted Shell (SMRSH) in Sendmail 8.12.6, 8.11.6-15, and possibly other versions after 8.11 from 5/19/1998, allows attackers to bypass the intended restrictions of smrsh by inserting additional commands after (1) \"||\" sequences or (2) \"/\" characters, which are not properly filtered or verified.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1165" }, { "category": "external", "summary": "RHBZ#1616854", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616854" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1165", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1165" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1165", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1165" } ], "release_date": "2002-10-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-03-03T17:04:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:073" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2002-1337", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616877" } ], "notes": [ { "category": "description", "text": "Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1337" }, { "category": "external", "summary": "RHBZ#1616877", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616877" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1337", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1337" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1337", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1337" } ], "release_date": "2003-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-03-03T17:04:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:073" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" } ] }
cve-2002-1165
Vulnerability from fkie_nvd
Published
2002-10-11 04:00
Modified
2024-11-20 23:40
Severity ?
Summary
Sendmail Consortium's Restricted Shell (SMRSH) in Sendmail 8.12.6, 8.11.6-15, and possibly other versions after 8.11 from 5/19/1998, allows attackers to bypass the intended restrictions of smrsh by inserting additional commands after (1) "||" sequences or (2) "/" characters, which are not properly filtered or verified.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sendmail:sendmail:8.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "598F74BA-2B71-435E-92B8-9DEADB3311A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sendmail:sendmail:8.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "79A46DF2-8EEB-40C8-B1CA-01BC064BD25E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sendmail:sendmail:8.12.2:*:*:*:*:*:*:*", "matchCriteriaId": "581E5904-1A2B-49FF-BE3F-D42019AD816B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sendmail:sendmail:8.12.3:*:*:*:*:*:*:*", "matchCriteriaId": "B6CC4C83-4FB9-4344-AFCB-C260659F81DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sendmail:sendmail:8.12.4:*:*:*:*:*:*:*", "matchCriteriaId": "CAF763B4-58E3-4868-8C92-47DE3E4E5F40", "vulnerable": true }, { "criteria": "cpe:2.3:a:sendmail:sendmail:8.12.5:*:*:*:*:*:*:*", "matchCriteriaId": "8A4FCB77-7FAC-4A4B-851C-2F352B44D3CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sendmail:sendmail:8.12.6:*:*:*:*:*:*:*", "matchCriteriaId": "6FEB3923-8F4B-4523-84F9-17D1CFA37F8C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netbsd:netbsd:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "E10D9BF9-FCC7-4680-AD3A-95757FC005EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "78E8C3A4-9FA7-4F2A-8C65-D4404715E674", "vulnerable": true }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "DBA2E3A3-EB9B-4B20-B754-EEC914FB1D47", "vulnerable": true }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "7AC78BA4-70F4-4B9F-93C2-B107E4DCC418", "vulnerable": true }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.6:*:*:*:*:*:*:*", "matchCriteriaId": "28A10F5A-067E-4DD8-B585-ABCD6F6B324E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sendmail Consortium\u0027s Restricted Shell (SMRSH) in Sendmail 8.12.6, 8.11.6-15, and possibly other versions after 8.11 from 5/19/1998, allows attackers to bypass the intended restrictions of smrsh by inserting additional commands after (1) \"||\" sequences or (2) \"/\" characters, which are not properly filtered or verified." }, { "lang": "es", "value": "Sendmail Consortium\u0027s Restricted Shell (SMRSH) en Sendmail 8.12.6, 8.11.6-15 y anteriores, permite a atacantes puentear las restricciones pretendidas de smrsh insertando caract\u00e9res adicionales despu\u00e9s de secuencias \"||\" (dos barras verticales) o \"/\" (barra), que no son adecuadamente filtradas o verificadas." } ], "id": "CVE-2002-1165", "lastModified": "2024-11-20T23:40:44.000", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-10-11T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-023.txt.asc" }, { "source": "cve@mitre.org", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000532" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=103350914307274\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/7826" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/10232.php" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2002:083" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2003-073.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/5845" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.sendmail.org/smrsh.adv.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-023.txt.asc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000532" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=103350914307274\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/7826" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/10232.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2002:083" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2003-073.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/5845" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.sendmail.org/smrsh.adv.txt" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
ghsa-48jx-mwjr-89wq
Vulnerability from github
Published
2022-05-03 03:08
Modified
2022-05-03 03:08
Details
Sendmail Consortium's Restricted Shell (SMRSH) in Sendmail 8.12.6, 8.11.6-15, and possibly other versions after 8.11 from 5/19/1998, allows attackers to bypass the intended restrictions of smrsh by inserting additional commands after (1) "||" sequences or (2) "/" characters, which are not properly filtered or verified.
{ "affected": [], "aliases": [ "CVE-2002-1165" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2002-10-11T04:00:00Z", "severity": "MODERATE" }, "details": "Sendmail Consortium\u0027s Restricted Shell (SMRSH) in Sendmail 8.12.6, 8.11.6-15, and possibly other versions after 8.11 from 5/19/1998, allows attackers to bypass the intended restrictions of smrsh by inserting additional commands after (1) \"||\" sequences or (2) \"/\" characters, which are not properly filtered or verified.", "id": "GHSA-48jx-mwjr-89wq", "modified": "2022-05-03T03:08:04Z", "published": "2022-05-03T03:08:04Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1165" }, { "type": "WEB", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000532" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=103350914307274\u0026w=2" }, { "type": "WEB", "url": "http://secunia.com/advisories/7826" }, { "type": "WEB", "url": "http://www.iss.net/security_center/static/10232.php" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2002:083" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2003-073.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/5845" }, { "type": "WEB", "url": "http://www.sendmail.org/smrsh.adv.txt" } ], "schema_version": "1.4.0", "severity": [] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.