Vulnerability Name: | CCN-12888 | ||||||
Published: | 2003-08-08 | ||||||
Updated: | 2003-08-08 | ||||||
Summary: | MDaemon could allow a remote attacker to gain unauthorized access to the SMTP service, caused by a vulnerability in the Simple Mail Transfer Protocol (SMTP) authentication feature. A remote attacker could supply a valid username and a blank password during authentication to gain unauthorized access to the SMTP service. If the mail server is configured for mail relaying, this could allow the attacker to send unauthorized SPAM. | ||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||
CVSS v2 Severity: | 7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||
Vulnerability Consequences: | Gain Access | ||||||
References: | Source: CCN Type: BugTraq Mailing List, Fri Aug 08 2003 - 18:59:59 CDT MDaemon 5.0.5 authentication vulnerability Source: CCN Type: Alt-N Technologies Web site Mdaemon Source: CCN Type: BID-8382 MDaemon SMTP Server Null Password Authentication Vulnerability Source: XF Type: UNKNOWN mdaemon-smtp-gain-access(12888) | ||||||
Vulnerable Configuration: | Configuration CCN 1: Denotes that component is vulnerable | ||||||
BACK |