First published: Thu Oct 03 2002(Updated: )
Sendmail Consortium's Restricted Shell (SMRSH) in Sendmail 8.12.6, 8.11.6-15, and possibly other versions after 8.11 from 5/19/1998, allows attackers to bypass the intended restrictions of smrsh by inserting additional commands after (1) "||" sequences or (2) "/" characters, which are not properly filtered or verified.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sendmail Sendmail | =8.12.0 | |
Sendmail Sendmail | =8.12.1 | |
Sendmail Sendmail | =8.12.2 | |
Sendmail Sendmail | =8.12.3 | |
Sendmail Sendmail | =8.12.4 | |
Sendmail Sendmail | =8.12.5 | |
Sendmail Sendmail | =8.12.6 | |
NetBSD NetBSD | =1.5 | |
NetBSD NetBSD | =1.5.1 | |
NetBSD NetBSD | =1.5.2 | |
NetBSD NetBSD | =1.5.3 | |
NetBSD NetBSD | =1.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1165 has been classified as a high-severity vulnerability due to the ease of exploitation and potential impact on system integrity.
To mitigate CVE-2002-1165, upgrade Sendmail to a version that is not affected by this vulnerability, specifically 8.12.7 or later.
CVE-2002-1165 affects Sendmail versions 8.12.6, 8.11.6-15, and possibly older versions dating back to 5/19/1998.
Exploitation of CVE-2002-1165 allows attackers to bypass command restrictions, which could lead to unauthorized command execution.
While CVE-2002-1165 is an older vulnerability, systems running affected versions of Sendmail remain at risk if not properly updated.