<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Qmail — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/qmail/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 17 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/qmail/feed.xml" rel="self" type="application/rss+xml"/><item><title>Sagredo qmail Remote Code Execution Vulnerability (CVE-2026-41113)</title><link>https://feed.craftedsignal.io/briefs/2026-04-qmail-rce/</link><pubDate>Fri, 17 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-qmail-rce/</guid><description>A remote code execution vulnerability exists in Sagredo qmail versions prior to 2026.04.07 due to the use of `popen` in the `notlshosts_auto` function within `qmail-remote.c`, potentially leading to OS command injection.</description><content:encoded><![CDATA[<p>Sagredo qmail, a mail transfer agent (MTA), is vulnerable to a remote code execution (RCE) flaw, identified as CVE-2026-41113.  Specifically, versions prior to 2026.04.07 are affected. The vulnerability lies in the <code>notlshosts_auto</code> function within the <code>qmail-remote.c</code> file, where the <code>popen</code> function is used without proper sanitization, potentially allowing an attacker to inject and execute arbitrary OS commands. This vulnerability could be exploited by a remote attacker without requiring authentication, making it a critical security concern for organizations utilizing the affected qmail versions. Defenders should prioritize patching and consider implementing mitigations to prevent potential exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker sends an email to a target qmail server.</li>
<li>The qmail server receives the email and processes the recipient address.</li>
<li>During the delivery process, <code>qmail-remote.c</code> is invoked to handle remote delivery.</li>
<li>The <code>notlshosts_auto</code> function is called within <code>qmail-remote.c</code> to determine if TLS should be used for the connection.</li>
<li>The <code>notlshosts_auto</code> function executes the <code>popen</code> command with a crafted input string from the email, attempting to resolve hostnames.</li>
<li>The attacker injects malicious commands into the hostname string, which are then executed by <code>popen</code> on the server.</li>
<li>The attacker gains arbitrary code execution on the qmail server.</li>
<li>The attacker can then pivot to other systems within the network or exfiltrate sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-41113 allows a remote attacker to execute arbitrary code on the vulnerable qmail server. This could lead to complete system compromise, data breaches, or denial-of-service conditions. Organizations using vulnerable versions of qmail are at risk of losing control of their email infrastructure and potentially exposing sensitive information. While the number of actively exploited instances is currently unknown, the high CVSS score (8.1) underscores the severity and potential for widespread impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to Sagredo qmail version 2026.04.07 or later to patch CVE-2026-41113 (reference: <a href="https://github.com/sagredo-dev/qmail/releases/tag/v2026.04.07">https://github.com/sagredo-dev/qmail/releases/tag/v2026.04.07</a>).</li>
<li>Implement network segmentation to limit the impact of a successful compromise on the qmail server.</li>
<li>Monitor qmail server logs for suspicious activity, such as unusual process execution or network connections (enable process_creation and network_connection logging).</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious Qmail Remote Execution via popen&rdquo; to identify potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>qmail</category><category>rce</category><category>command-injection</category><category>CVE-2026-41113</category></item></channel></rss>