Vulnerability CVE-2008-7258


Published: 2010-08-20   Modified: 2012-02-12

Description:
** DISPUTED ** The standardise function in Anibal Monsalve Salazar sSMTP 2.61 and 2.62 allows local users to cause a denial of service (application exit) via an e-mail message containing a long line that begins with a . (dot) character. NOTE: CVE disputes this issue because it is solely a usability problem for senders of messages with certain long lines, and has no security impact.

See advisories in our WLB2 database:
Topic
Author
Date
High
ssmtp 2.62 standardise() Buffer overflow
Jan Lieskovsky
24.08.2010

Type:

CWE-20

(Improper Input Validation)

CVSS2 => (AV:L/AC:L/Au:N/C:N/I:N/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
2.1/10
2.9/10
3.9/10
Exploit range
Attack complexity
Authentication
Local
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
None
Partial
Affected software
Anibal monsalve salaz -> Ssmtp 

 References:
http://patch-tracker.debian.org/patch/series/view/ssmtp/2.62-3/345780-standardise-bufsize
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2008-7258
https://bugzilla.redhat.com/show_bug.cgi?id=582236
https://bugs.launchpad.net/ubuntu/+source/ssmtp/+bug/282424
http://www.securityfocus.com/bid/41965
http://www.openwall.com/lists/oss-security/2010/08/19/6
http://secunia.com/advisories/41009
http://marc.info/?l=oss-security&m=128077707318085&w=2
http://marc.info/?l=oss-security&m=128017258305041&w=2
http://marc.info/?l=oss-security&m=128013391907262&w=2
http://lists.fedoraproject.org/pipermail/package-announce/2010-August/045422.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-August/045407.html

Copyright 2024, cxsecurity.com

 

Back to Top