FreeBSD Ports: spamass-milter

Published: 2010-05-14 18:09:58
CVE Author: NIST National Vulnerability Database

CVSS Base Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Technical Details:
The following Linux Distribution Package is affected: spamass-milter CVE-2010-1132 The mlfi_envrcpt function in spamass-milter.cpp in SpamAssassin Milter Plugin 0.3.1, when using the expand option, allows remote attackers to execute arbitrary system commands via shell metacharacters in the RCPT TO field of an email message.

Recommendations:
Update your system with the appropriate patches or software upgrades. http://archives.neohapsis.com/archives/fulldisclosure/2010-03/0139.html http://xforce.iss.net/xforce/xfdb/56732 http://www.vuxml.org/freebsd/7132c842-58e2-11df-8d80-0015587e2cc1.html

Summary:
The remote host is missing an update to the system as announced in the referenced advisory.

Detection Type:
Linux Distribution Package

Solution Type:
Vendor Patch

NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database)

https://nvd.nist.gov/vuln/detail/CVE-2010-1132

CVE Analysis

https://www.mageni.net/cve/CVE-2010-1132

Severity
High
CVSS Score
9.3
Published
2010-05-14
Modified
2017-12-27
Category
FreeBSD Local Security Checks

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities. It is free and always will be.