• CVSS Severity Rating • Fix Information • Vulnerable Software Versions • SCAP Mappings • CPE Information
A Sendmail alias allows input to be piped to a program.
Note: References are provided for the convenience of the reader to help distinguish between vulnerabilities. The list is not intended to be complete.
Assigning CNA
MITRE Corporation
Date Record Created
19990607 Disclaimer: The record creation date may reflect when the CVE ID was allocated or reserved, and does not necessarily indicate when this vulnerability was discovered, shared with the affected vendor, publicly disclosed, or updated in CVE.
Phase (Legacy)
Proposed (19990728)
Votes (Legacy)
ACCEPT(1) Northcutt
NOOP(1) Baker
RECAST(1) Shostack
REVIEWING(1) Christey
Comments (Legacy)
 Shostack> Is this a default alias?  Is my .procmailrc an instance of this?
 Christey> It is not entirely clear whether the simple fact that an alias
   pipes into a program should be considered a vulnerability.  It
   all depends on the behavior of that particular program.  This
   is one of a number of configuration-related issues from the
   "draft" CVE that came from vulnerability scanners.  In
   general, when we get to general configuration and "policy,"
   it becomes more difficult to use the current CVE model to
   represent them.  So at the very least, this candidate (and
   similar ones) should be given close consideration and
   discussion before being added to the official CVE list.
   Because this candidate is related to general configuration
   issues, and we have not completely determined how to handle
   such issues in CVE, this candidate cannot be promoted to an
   official CVE entry until such issues are resolved.

Proposed (Legacy)
This is a record on the CVE List, which provides common identifiers for publicly known cybersecurity vulnerabilities.