First published: Thu Feb 04 1999(Updated: )
The metamail package allows remote command execution using shell metacharacters that are not quoted in a mailcap entry.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MetaInfo MetaWeb | =3.1 | |
Sendmail | =2.0 | |
Sendmail | =2.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-1999-0365 is considered to be of high severity due to its potential for remote command execution.
To fix CVE-1999-0365, update the metamail package to a version that properly quotes shell metacharacters.
CVE-1999-0365 affects the metamail package, specifically versions in the MetaInfo MetaIP 3.1 and Sendmail 2.0 and 2.5.
Yes, CVE-1999-0365 can be exploited remotely through malicious mailcap entries.
In the context of CVE-1999-0365, shell metacharacters are special characters in a command line that allow for command manipulation and injection.