[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248585

 
 

909

 
 

195621

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2015-467 --- mailx

ID: oval:org.secpod.oval:def:1200154Date: (C)2015-12-28   (M)2023-07-28
Class: PATCHFamily: unix




A flaw was found in the way mailx handled the parsing of email addresses. A syntactically valid email address could allow a local attacker to cause mailx to execute arbitrary shell commands through shell meta-characters and the direct command execution functionality. Note: Applications using mailx to send email to addresses obtained from untrusted sources will still remain vulnerable to other attacks if they accept email addresses which start with "-" . To counteract this issue, this update also introduces the "--" option, which will treat the remaining command line arguments as email addresses.

Platform:
Amazon Linux AMI
Product:
mailx
Reference:
ALAS-2015-467
CVE-2004-2771
CVE-2014-7844
CVE    2
CVE-2004-2771
CVE-2014-7844
CPE    2
cpe:/o:amazon:linux
cpe:/a:sgi:mailx

© SecPod Technologies