Bug 37369

Summary: bsd-mailx: Command injection (3.2)
Product: UCS Reporter: Moritz Muehlenhoff <jmm>
Component: Security updatesAssignee: Janek Walkenhorst <walkenhorst>
Status: CLOSED FIXED QA Contact: Moritz Muehlenhoff <jmm>
Severity: normal    
Priority: P5    
Version: UCS 3.2   
Target Milestone: UCS 3.2-4-errata   
Hardware: Other   
OS: Linux   
What kind of report is it?: --- What type of bug is this?: ---
Who will be affected by this bug?: --- How will those affected feel about the bug?: ---
User Pain: Enterprise Customer affected?:
School Customer affected?: ISV affected?:
Waiting Support: Flags outvoted (downgraded) after PO Review:
Ticket number: Bug group (optional):
Max CVSS v3 score:

Description Moritz Muehlenhoff univentionstaff 2014-12-17 09:03:37 CET
An undocumented feature in mailx (the implementation of the mail command) allows the execution of arbitrary commands if the email address is obtained from a remote source (CVE-2014-7844)
Comment 1 Janek Walkenhorst univentionstaff 2014-12-18 17:38:58 CET
squeeze-lts imported.
Tests (amd64): OK
Advisory: 2014-12-18-bsd-mailx.yaml
Comment 2 Moritz Muehlenhoff univentionstaff 2014-12-19 09:59:45 CET
Update ok, YAML file ok.
Comment 3 Janek Walkenhorst univentionstaff 2014-12-19 14:02:18 CET
http://errata.univention.de/ucs/3.2/261.html