Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-frwj-4rf4-3wjf

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The sm_close_on_exec function in conf.c in sendmail before 8.14.9 has arguments in the wrong order, and consequently skips setting expected FD_CLOEXEC flags, which allows local users to access unintended high-numbered file descriptors via a custom mail-delivery program.

The sm_close_on_exec function in conf.c in sendmail before 8.14.9 has arguments in the wrong order, and consequently skips setting expected FD_CLOEXEC flags, which allows local users to access unintended high-numbered file descriptors via a custom mail-delivery program.

EPSS

Процентиль: 30%
0.00111
Низкий

Дефекты

CWE-200

Связанные уязвимости

ubuntu
около 11 лет назад

The sm_close_on_exec function in conf.c in sendmail before 8.14.9 has arguments in the wrong order, and consequently skips setting expected FD_CLOEXEC flags, which allows local users to access unintended high-numbered file descriptors via a custom mail-delivery program.

redhat
около 11 лет назад

The sm_close_on_exec function in conf.c in sendmail before 8.14.9 has arguments in the wrong order, and consequently skips setting expected FD_CLOEXEC flags, which allows local users to access unintended high-numbered file descriptors via a custom mail-delivery program.

nvd
около 11 лет назад

The sm_close_on_exec function in conf.c in sendmail before 8.14.9 has arguments in the wrong order, and consequently skips setting expected FD_CLOEXEC flags, which allows local users to access unintended high-numbered file descriptors via a custom mail-delivery program.

debian
около 11 лет назад

The sm_close_on_exec function in conf.c in sendmail before 8.14.9 has ...

fstec
около 11 лет назад

Уязвимость программного обеспечения SendMail SMTP Server, позволяющая злоумышленнику нарушить конфиденциальность защищаемой информации

EPSS

Процентиль: 30%
0.00111
Низкий

Дефекты

CWE-200