USN-2455-1

Source
https://ubuntu.com/security/notices/USN-2455-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2455-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-2455-1
Related
Published
2015-01-07T19:26:56.474553Z
Modified
2015-01-07T19:26:56.474553Z
Summary
bsd-mailx vulnerability
Details

It was discovered that bsd-mailx contained a feature that allowed syntactically valid email addresses to be treated as shell commands. A remote attacker could possibly use this issue with a valid email address to execute arbitrary commands.

This functionality has now been disabled by default, and can be re-enabled with the "expandaddr" configuration option. This update alone does not remove all possibilities of command execution. In environments where scripts use mailx to process arbitrary email addresses, it is recommended to modify them to use a "--" separator before the address to properly handle those that begin with "-". In addition, specifying sendmail options after the "--" separator is no longer supported, existing scripts may need to be modified to use the "-a" option instead.

References

Affected packages

Ubuntu:14.04:LTS / bsd-mailx

Package

Name
bsd-mailx
Purl
pkg:deb/ubuntu/bsd-mailx@8.1.2-0.20131005cvs-1ubuntu0.14.04.1?arch=source&distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
8.1.2-0.20131005cvs-1ubuntu0.14.04.1

Affected versions

8.*

8.1.2-0.20111106cvs-1ubuntu1
8.1.2-0.20131005cvs-1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "8.1.2-0.20131005cvs-1ubuntu0.14.04.1",
            "binary_name": "bsd-mailx"
        }
    ]
}