First published: Mon Apr 05 1999(Updated: )
Buffer overflow in procmail before version 3.12 allows remote or local attackers to execute commands via expansions in the procmailrc configuration file.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Procmail | <=3.12 | |
SCO OpenLinux Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-1999-0439 is considered to have a high severity due to its buffer overflow vulnerability allowing potential remote command execution.
To fix CVE-1999-0439, upgrade procmail to version 3.12 or later to eliminate the buffer overflow risk.
CVE-1999-0439 affects procmail versions prior to 3.12 and SCO OpenLinux Server installations.
Yes, CVE-1999-0439 can be exploited by both remote and local attackers due to unrestricted command execution via procmailrc file expansions.
The potential impacts of CVE-1999-0439 include unauthorized command execution, which could lead to system compromise and data loss.