Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
Sendmail custom configuration file
Information
Severity
Severity
Medium
Family
Family
SMTP problems
CVSSv2 Base
CVSSv2 Base
4.6
CVSSv2 Vector
CVSSv2 Vector
AV:L/AC:L/Au:N/C:P/I:P/A:P
Solution Type
Solution Type
Vendor Patch
Created
Created
18 years ago
Modified
Modified
5 years ago
Summary
The remote sendmail server, according to its version number, may be vulnerable to a 'Mail System Compromise' when a user supplies a custom configuration file. Although the mail server is suppose to run as a lambda user, a programming error allows the local attacker to regain the extra dropped privileges and run commands as root. Note: This vulnerability is _local_ only
Solution
Solution
Upgrade to the latest version of Sendmail.