Bug 37370 - bsd-mailx: Command injection (4.0)
Summary: bsd-mailx: Command injection (4.0)
Status: CLOSED FIXED
Alias: None
Product: UCS
Classification: Unclassified
Component: Security updates
Version: UCS 4.0
Hardware: Other Linux
: P5 normal
Target Milestone: UCS 4.0-0-errata
Assignee: Moritz Muehlenhoff
QA Contact: Janek Walkenhorst
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2014-12-17 09:04 CET by Moritz Muehlenhoff
Modified: 2015-01-13 11:25 CET (History)
0 users

See Also:
What kind of report is it?: ---
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Customer ID:
Max CVSS v3 score:


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Moritz Muehlenhoff univentionstaff 2014-12-17 09:04:10 CET
An undocumented feature in mailx (the implementation of the mail command) allows the execution of arbitrary commands if the email address is obtained from a remote source (CVE-2014-7844)
Comment 1 Moritz Muehlenhoff univentionstaff 2015-01-12 10:50:39 CET
A fixed package has been built. 

YAML file: 2015-01-12-bsd-mailx.yaml
Comment 2 Janek Walkenhorst univentionstaff 2015-01-12 15:29:36 CET
Tests: OK
Advisory: OK
Comment 3 Moritz Muehlenhoff univentionstaff 2015-01-13 11:25:16 CET
http://errata.univention.de/ucs/4.0/25.html