header-logo
Suggest Exploit
vendor:
/bin/mail Utility
by:
Mark
7,5
CVSS
HIGH
Buffer Overrun
120 (Buffer Copy without Checking Size of Input)
CWE
Product Name: /bin/mail Utility
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Redhat 9.0, Slackware 8.1, Slackware 9.0, Debian 3.0
2002

Buffer Overrun in Linux /bin/mail Utility

A vulnerability has been discovered in the Linux /bin/mail utility. The problem occurs when processing excessive data within the carbon copy field. Due to insufficient bounds checking while parsing this information it may be possible to trigger a buffer overrun. An attacker could exploit this issue to execute arbitrary commands.

Mitigation:

Ensure that the /bin/mail utility is up to date and that all security patches have been applied.
Source

Exploit-DB raw data: