First published: Wed Aug 23 1995(Updated: )
SunOS sendmail 5.59 through 5.65 uses popen to process a forwarding host argument, which allows local users to gain root privileges by modifying the IFS (Internal Field Separator) variable and passing crafted values to the -oR option.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sendmail | =5.59 | |
Sendmail | =5.61 | |
Sendmail | =5.65 | |
Sun SunOS | =4.1.1 | |
Sun SunOS | =4.1.2 | |
Sun SunOS | =4.1.3 | |
Sun SunOS | =4.1.3c | |
Sun SunOS | =4.1.3u1 | |
Sun SunOS | =4.1.4 | |
Sun SunOS | =4.1.4jl | |
SunOS | =4.1.1 | |
SunOS | =4.1.2 | |
SunOS | =4.1.3 | |
SunOS | =4.1.3c | |
SunOS | =4.1.3u1 | |
SunOS | =4.1.4 | |
SunOS | =4.1.4jl |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-1999-1580 has a high severity due to the potential for local users to gain root privileges.
To fix CVE-1999-1580, upgrade to a later version of Sendmail that does not use popen to process the -oR option.
Sendmail versions 5.59, 5.61, and 5.65 are affected by CVE-1999-1580.
No, CVE-1999-1580 can only be exploited by local users on the system.
SunOS versions 4.1.1 through 4.1.4 and Sendmail versions 5.59 to 5.65 are vulnerable to CVE-1999-1580.