CVE-2010-1132

N/A Unknown
Published: March 27, 2010 Modified: April 29, 2026
View on NVD

Description

The mlfi_envrcpt function in spamass-milter.cpp in SpamAssassin Milter Plugin 0.3.1, when using the expand option, allows remote attackers to execute arbitrary system commands via shell metacharacters in the RCPT TO field of an email message.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://bugs.debian.org/573228
Source: cve@mitre.org
http://osvdb.org/62809
Source: cve@mitre.org
http://secunia.com/advisories/38840
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/38956
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/39265
Source: cve@mitre.org
Vendor Advisory
http://www.exploit-db.com/exploits/11662
Source: cve@mitre.org
Exploit
http://www.securityfocus.com/bid/38578
Source: cve@mitre.org
Exploit
http://www.vupen.com/english/advisories/2010/0559
Source: cve@mitre.org
Vendor Advisory
http://www.vupen.com/english/advisories/2010/0683
Source: cve@mitre.org
Vendor Advisory
http://www.vupen.com/english/advisories/2010/0837
Source: cve@mitre.org
Vendor Advisory
http://archives.neohapsis.com/archives/fulldisclosure/2010-03/0139.html
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://bugs.debian.org/573228
Source: af854a3a-2127-422b-91ae-364da2661108
http://osvdb.org/62809
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/38840
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/38956
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/39265
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.debian.org/security/2010/dsa-2021
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.exploit-db.com/exploits/11662
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.securityfocus.com/bid/38578
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.securitytracker.com/id?1023691
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2010/0559
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2010/0683
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2010/0837
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=572117
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/56732
Source: af854a3a-2127-422b-91ae-364da2661108
https://savannah.nongnu.org/bugs/?29136
Source: af854a3a-2127-422b-91ae-364da2661108

38 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
23.7%
96th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

georg_greve