Step 1: Local Access: The attacker must first have local access to the vulnerable system, either through a compromised account or physical access.
Step 2: Daemon Startup: The attacker executes a command to start Sendmail in daemon mode, typically using a command-line utility or a script.
Step 3: Malicious Argument Injection: The attacker crafts a command-line argument that, when processed by Sendmail, leads to the execution of arbitrary code. This could involve manipulating configuration files, logging options, or other parameters that are processed with root privileges.
Step 4: Code Execution: Sendmail, running with root privileges, processes the malicious argument, leading to the execution of attacker-controlled code, such as a shell or a payload to gain full root access.
Step 5: Privilege Escalation: The attacker's code executes with root privileges, allowing them to modify system files, install backdoors, and gain complete control of the system.