Skip to main content

CVE-1999-0207: Remote attacker can execute commands through Majordomo using the Reply-To field and a "lists" comman

High
VulnerabilityCVE-1999-0207cve-1999-0207
Published: Thu Jun 09 1994 (06/09/1994, 04:00:00 UTC)
Source: NVD
Vendor/Project: great_circle_associates
Product: majordomo

Description

Remote attacker can execute commands through Majordomo using the Reply-To field and a "lists" command.

AI-Powered Analysis

AILast updated: 07/01/2025, 16:55:12 UTC

Technical Analysis

CVE-1999-0207 is a high-severity remote code execution vulnerability affecting Majordomo versions 1.90 and 1.91, a widely used mailing list management software from the 1990s. The vulnerability arises because Majordomo improperly handles the Reply-To email header field when processing the "lists" command. An unauthenticated remote attacker can craft a malicious email with a specially constructed Reply-To field that injects arbitrary commands into the Majordomo processing logic. When the software parses this field, it executes the injected commands with the privileges of the Majordomo process, potentially allowing full system compromise. The vulnerability is network exploitable without authentication or user interaction, and impacts confidentiality, integrity, and availability of the affected systems. Despite its age and lack of patch availability, this vulnerability is notable for its ease of exploitation and the critical impact it can have on systems running these legacy Majordomo versions. No known exploits are currently reported in the wild, but the vulnerability remains a significant risk for legacy systems still in operation.

Potential Impact

For European organizations, the impact of this vulnerability depends largely on whether legacy Majordomo mailing list software is still in use. If so, exploitation could lead to unauthorized command execution on critical mail servers, resulting in data breaches, disruption of communication infrastructure, and potential lateral movement within networks. This could compromise sensitive organizational data and disrupt business operations. Given the nature of mailing list servers as communication hubs, successful exploitation could also facilitate phishing or malware distribution campaigns targeting European users. Although modern organizations have largely migrated away from Majordomo, some institutions with legacy infrastructure or specialized use cases may remain vulnerable, posing a risk to their operational security and compliance with data protection regulations such as GDPR.

Mitigation Recommendations

Since no official patches are available for this vulnerability, organizations should prioritize decommissioning or upgrading from Majordomo versions 1.90 and 1.91 to modern, actively maintained mailing list management solutions. If immediate replacement is not feasible, network-level mitigations should be implemented, including strict filtering of inbound email traffic to block suspicious Reply-To headers and restricting access to the Majordomo server to trusted internal networks only. Employing intrusion detection/prevention systems (IDS/IPS) to monitor for anomalous command injection patterns in email headers can provide additional defense. Regular audits of legacy systems should be conducted to identify and isolate vulnerable instances. Finally, organizations should consider migrating mailing list functionality to cloud-based or containerized platforms with robust security controls to eliminate exposure to this and similar legacy vulnerabilities.

Need more detailed analysis?Get Pro

Threat ID: 682ca32ab6fd31d6ed7de435

Added to database: 5/20/2025, 3:43:38 PM

Last enriched: 7/1/2025, 4:55:12 PM

Last updated: 7/26/2025, 6:13:57 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats