Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-7844

Опубликовано: 16 дек. 2014
Источник: redhat
CVSS2: 3.6
EPSS Низкий

Описание

BSD mailx 8.1.2 and earlier allows remote attackers to execute arbitrary commands via a crafted email address.

A flaw was found in the way mailx handled the parsing of email addresses. A syntactically valid email address could allow a local attacker to cause mailx to execute arbitrary shell commands through shell meta-characters (CVE-2004-2771) and the direct command execution functionality (CVE-2014-7844).

Отчет

Red Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5mailxWill not fix
Red Hat Enterprise Linux 6mailxFixedRHSA-2014:199916.12.2014
Red Hat Enterprise Linux 7mailxFixedRHSA-2014:199916.12.2014

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-78

EPSS

Процентиль: 75%
0.0091
Низкий

3.6 Low

CVSS2

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 5 лет назад

BSD mailx 8.1.2 and earlier allows remote attackers to execute arbitrary commands via a crafted email address.

CVSS3: 7.8
nvd
больше 5 лет назад

BSD mailx 8.1.2 and earlier allows remote attackers to execute arbitrary commands via a crafted email address.

CVSS3: 7.8
debian
больше 5 лет назад

BSD mailx 8.1.2 and earlier allows remote attackers to execute arbitra ...

CVSS3: 7.8
github
около 3 лет назад

BSD mailx 8.1.2 and earlier allows remote attackers to execute arbitrary commands via a crafted email address.

suse-cvrf
больше 11 лет назад

Recommended update for mailx

EPSS

Процентиль: 75%
0.0091
Низкий

3.6 Low

CVSS2