Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Sendmail custom configuration file

Information

Severity

Severity

Medium

Family

Family

SMTP problems

CVSSv2 Base

CVSSv2 Base

4.6

CVSSv2 Vector

CVSSv2 Vector

AV:L/AC:L/Au:N/C:P/I:P/A:P

Solution Type

Solution Type

Vendor Patch

Created

Created

18 years ago

Modified

Modified

5 years ago

Summary

The remote sendmail server, according to its version number, may be vulnerable to a 'Mail System Compromise' when a user supplies a custom configuration file. Although the mail server is suppose to run as a lambda user, a programming error allows the local attacker to regain the extra dropped privileges and run commands as root. Note: This vulnerability is _local_ only

Solution

Solution

Upgrade to the latest version of Sendmail.

Common Vulnerabilities and Exposures (CVE)