Lucene search

K
cve[email protected]CVE-2008-2784
HistoryJun 19, 2008 - 8:41 p.m.

CVE-2008-2784

2008-06-1920:41:00
CWE-264
web.nvd.nist.gov
28
cve-2008-2784
smtp_filter
spamdyke
open mail relay
nvd
remote attackers
security vulnerability

6.4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:P/A:P

6.8 Medium

AI Score

Confidence

High

0.006 Low

EPSS

Percentile

78.1%

The smtp_filter function in spamdyke before 3.1.8 does not filter RCPT commands after encountering the first DATA command, which allows remote attackers to use the server as an open mail relay by sending RCPT commands with invalid recipients, followed by a DATA command, followed by arbitrary RCPT commands and a second DATA command.

Affected configurations

NVD
Node
spamdykespamdykeMatch3.0.0
OR
spamdykespamdykeMatch3.0.1
OR
spamdykespamdykeMatch3.1.0
OR
spamdykespamdykeMatch3.1.1
OR
spamdykespamdykeMatch3.1.2
OR
spamdykespamdykeMatch3.1.3
OR
spamdykespamdykeMatch3.1.4
OR
spamdykespamdykeMatch3.1.5
OR
spamdykespamdykeMatch3.1.6
OR
spamdykespamdykeMatch3.1.7

6.4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:P/A:P

6.8 Medium

AI Score

Confidence

High

0.006 Low

EPSS

Percentile

78.1%