Debian Security Advisory

metamail -- It may be possible to make metamail execute arbitrary commands

Date Reported:
09 Apr 1997
Affected Packages:
metamail
Vulnerable:
No
Security database references:
No other external database security references currently available.
More information:

Original submitter of the report: Olaf Kirch <okir@lst.de>

The hole may be exploitable if you let metamail run showext for messages of type message/external-body. At least tcsh, and possibly a few other csh's, do seem to do weird things when expanding command line arguments. If you give a script an argument of "foo FTP=/tmp/evilcmd", and it does

	set var=$1

this will assign foo to $var, and /tmp/evilcmd to $FTP. Unfortunately, metamail invokes showext with the MIME attributes on the command line, so you basically send it a header like this

   Content-type:  message/external-body;
	   access-type="anon-ftp";
	   name="passwd";
	   site="monad.swb.de";
	   directory="/etc";
	   mode="image FTP=/tmp/evilcmd"

Further below, the script will run $FTP to initiate the FTP connection. Up to now, I have not been able to pass arguments to the command, but that doesn't mean that you can't do interesting things with the above.

[Patch removed due to age.]