First published: Thu Oct 03 2002(Updated: )
Sendmail Consortium's Restricted Shell (SMRSH) in Sendmail 8.12.6, 8.11.6-15, and possibly other versions after 8.11 from 5/19/1998, allows attackers to bypass the intended restrictions of smrsh by inserting additional commands after (1) "||" sequences or (2) "/" characters, which are not properly filtered or verified.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sendmail Sendmail | =8.12.0 | |
Sendmail Sendmail | =8.12.1 | |
Sendmail Sendmail | =8.12.2 | |
Sendmail Sendmail | =8.12.3 | |
Sendmail Sendmail | =8.12.4 | |
Sendmail Sendmail | =8.12.5 | |
Sendmail Sendmail | =8.12.6 | |
NetBSD NetBSD | =1.5 | |
NetBSD NetBSD | =1.5.1 | |
NetBSD NetBSD | =1.5.2 | |
NetBSD NetBSD | =1.5.3 | |
NetBSD NetBSD | =1.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.