SpamAssassin Milter Plugin expand (-x) flag command execution
|spamassassin-expand-command-execution (56732)||High Risk|
The SpamAssassin Milter Plugin could allow a remote attacker to execute arbitrary commands on the system, caused by the improper validation of input by the mlfi_envrcpt function prior to being used in a popen() function call. If invoked with the expand (-x) flag, a remote attacker could send a specially crafted RCPT TO value to inject and execute arbitrary shell commands on the system with elevated privileges.
Apply the appropriate patch for your system. See References.
- Full-Disclosure Mailing List, Sun Mar 07 2010: Spamassassin Milter Plugin Remote Root.
- Offensive Security Exploit Database [03-09-2010]: Apache Spamassassin Milter Plugin Remote Root Command Execution .
- SpamAssassin Web site: SpamAssassin: Welcome to SpamAssassin.
- BID-38578: SpamAssassin Milter Plugin 'mlfi_envrcpt()' Remote Arbitrary Command Injection Vulnerability
- CVE-2010-1132: The mlfi_envrcpt function in spamass-milter.cpp in SpamAssassin Milter Plugin 0.3.1, when using the expand option, allows remote attackers to execute arbitrary system commands via shell metacharacters in the RCPT TO field of an email message.
- DSA-2021: spamass-milter -- missing input sanitization
- OSVDB ID: 62809: SpamAssassin Milter Plugin spamass-milter.cpp mlfi_envrcpt Function Arbitrary Shell Command Execution
- SA38840: SpamAssassin Milter Plugin Shell Command Injection
- SECTRACK ID: 1023691: SpamAssassin Milter Plugin Input Validation Flaw Lets Remote Users Execute Arbitrary Code
- VUPEN/ADV-2010-0559: Milter Plugin for SpamAssassin mlfi_envrcpt() Shell Injection Vulnerability
- VUPEN/ADV-2010-0683: Debian Security Update Fixes spamass-milter Code Injection Vulnerability
- VUPEN/ADV-2010-0837: Fedora Security Update Fixes spamass-milter Code Injection Vulnerability
- Apache SpamAssassin Milter Plugin 0.3.1
- Debian Debian Linux 5.0
Mar 07, 2010
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this
* According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall IBM be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.