Brendan Boerner reported:
[1] https://bugs.launchpad.net/ubuntu/+source/ssmtp/+bug/282424

a deficiency in the way ssmtp removed trailing '\n' sequence
by processing lines beginning with a leading dot. A local user,
could send a specially-crafted e-mail message via ssmtp send-only
sendmail emulator, leading to ssmtp executable denial of service (exit with:
ssmtp: standardise() -- Buffer overflow). Different vulnerability
than CVE-2008-3962.

References:
[2] https://bugzilla.redhat.com/show_bug.cgi?id=582236
[3] https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2008-3962
[4] http://patch-tracker.debian.org/package/ssmtp/2.62-3
[5] http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041012.html
[6] http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041009.html
[7] http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041119.html

Debian Linux distribution patch:
[8] http://patch-tracker.debian.org/patch/series/view/ssmtp/2.62-3/345780-standardise-bufsize

Public PoC (from https://bugzilla.redhat.com/show_bug.cgi?id=582236#c0):
 [9] ( 0. Install & configure ssmtp, of course )
         1. (echo -n . ; for i in {1..2050} ; do echo -n $i ; done) | mail root

Couldn't find CVE-2008-XXXX ssmtp identifier for this
(http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=ssmtp).

Steve, could you allocate one?

Thanks && Regards, Jan.