compose.cgi in Mailreader.com 2.3.30 and 2.3.31, when using Sendmail as the Mail Transfer Agent, allows remote attackers to execute arbitrary commands via shell metacharacters in the RealEmail configuration variable, which is used to call Sendmail in network.cgi.
References
Link | Resource |
---|---|
http://www.iss.net/security_center/static/10491.php | Patch Vendor Advisory |
http://www.mailreader.com/download/ChangeLog | Vendor Advisory |
http://www.securityfocus.com/archive/1/297428 | Exploit Patch Vendor Advisory |
http://www.securityfocus.com/bid/6058 | Patch Vendor Advisory |
http://www.iss.net/security_center/static/10491.php | Patch Vendor Advisory |
http://www.mailreader.com/download/ChangeLog | Vendor Advisory |
http://www.securityfocus.com/archive/1/297428 | Exploit Patch Vendor Advisory |
http://www.securityfocus.com/bid/6058 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:41
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.iss.net/security_center/static/10491.php - Patch, Vendor Advisory | |
References | () http://www.mailreader.com/download/ChangeLog - Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/297428 - Exploit, Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/6058 - Patch, Vendor Advisory |
Information
Published : 2004-12-06 05:00
Updated : 2024-11-20 23:41
NVD link : CVE-2002-1582
Mitre link : CVE-2002-1582
CVE.ORG link : CVE-2002-1582
JSON object : View
Products Affected
mailreader.com
- mailreader.com
CWE