Skip to main content

CVE-2000-0035: resend command in Majordomo allows local users to gain privileges via shell metacharacters.

Medium
VulnerabilityCVE-2000-0035cve-2000-0035
Published: Tue Dec 28 1999 (12/28/1999, 05:00:00 UTC)
Source: NVD
Vendor/Project: great_circle_associates
Product: majordomo

Description

resend command in Majordomo allows local users to gain privileges via shell metacharacters.

AI-Powered Analysis

AILast updated: 07/01/2025, 12:12:49 UTC

Technical Analysis

CVE-2000-0035 is a vulnerability found in the Majordomo mailing list management software, specifically related to the 'resend' command functionality. Majordomo is a Perl-based tool used to manage electronic mailing lists, popular in the late 1990s and early 2000s. The vulnerability arises because the 'resend' command improperly handles shell metacharacters, allowing local users to inject arbitrary shell commands. This flaw enables a local attacker to escalate privileges by executing commands with the permissions of the Majordomo process, which often runs with elevated privileges. The vulnerability requires local access to the system, meaning an attacker must already have some form of user-level access to exploit it. The CVSS score of 4.6 (medium severity) reflects that the attack vector is local, with low attack complexity, no authentication required, and partial impact on confidentiality, integrity, and availability. Since the vulnerability dates back to 1999 and no patch is available, it indicates that the software is likely outdated or unsupported. Exploitation could lead to unauthorized command execution, potentially compromising the system's security and allowing privilege escalation from a local user to a higher privileged context.

Potential Impact

For European organizations, the impact of this vulnerability depends largely on whether Majordomo is still in use within their infrastructure. Given the age of the software, it is unlikely to be widely deployed in modern environments; however, legacy systems or archival mailing list servers might still run it. If exploited, an attacker with local access could gain elevated privileges, leading to unauthorized access to sensitive data, modification or deletion of critical files, and potential disruption of mailing list services. This could result in data breaches, loss of integrity of communication channels, and availability issues. Organizations relying on legacy systems for communication or archival purposes are at risk of internal threats or attackers who have gained initial footholds through other means. The vulnerability could also be leveraged as part of a multi-stage attack to escalate privileges and move laterally within a network.

Mitigation Recommendations

Given that no official patch is available, European organizations should consider the following specific mitigation steps: 1) Identify and inventory any systems running Majordomo, especially those exposed to local users. 2) Where possible, decommission or replace Majordomo with modern, actively maintained mailing list management software that follows current security best practices. 3) Restrict local access to systems running Majordomo to trusted administrators only, minimizing the risk of exploitation by unprivileged users. 4) Employ strict access controls and monitoring on these systems to detect unusual command execution or privilege escalation attempts. 5) Use application sandboxing or containerization to limit the impact of potential exploits. 6) If legacy use is unavoidable, consider applying custom patches or wrappers to sanitize inputs to the 'resend' command, preventing shell metacharacter injection. 7) Regularly audit and monitor logs for suspicious activity related to Majordomo processes. 8) Educate system administrators about the risks associated with legacy software and the importance of timely upgrades or replacements.

Need more detailed analysis?Get Pro

Threat ID: 682ca32cb6fd31d6ed7df58c

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 7/1/2025, 12:12:49 PM

Last updated: 7/31/2025, 6:12:37 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats