vendor:
/bin/mailx
by:
segv
7.5
CVSS
HIGH
Buffer Overrun
120
CWE
Product Name: /bin/mailx
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Unix
2002
Buffer Overrun in /bin/mailx
A buffer overrun exists in the /bin/mailx program. By supplying a long, well crafted buffer as the username argument, an attacker can use it to execuate arbitrary code. On some systems, this will result in the ability to execute code as group mail.
Mitigation:
Ensure that the SHELL environment variable is not set to the name of this program.