|Title:||SpamAssassin Milter Plugin 'mlfi_envrcpt()' Remote Arbitrary Command Injection Vulnerability|
|Summary:||SpamAssassin Milter Plugin is prone to a remote command-; injection vulnerability because it fails to adequately sanitize user-supplied input data.|
SpamAssassin Milter Plugin is prone to a remote command-
injection vulnerability because it fails to adequately sanitize user-supplied input data.
Remote attackers can exploit this issue to execute arbitrary
shell commands with root privileges.
SpamAssassin Milter Plugin 0.3.1 is affected. Other versions
may also be vulnerable.
No known solution was made available for at least one year since the disclosure
of this vulnerability. Likely none will be provided anymore. General solution options are to upgrade to a newer
release, disable respective features, remove the product or replace the product by another one.
BugTraq ID: 38578|
Common Vulnerability Exposure (CVE) ID: CVE-2010-1132
Debian Security Information: DSA-2021 (Google Search)
XForce ISS Database: spamassassin-expand-command-execution(56732)
|Copyright||Copyright (C) 2010 Greenbone Networks GmbH|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.