Vulnerability Name:

CVE-1999-0284 (CCN-344)

Assigned:1998-01-01
Published:1998-01-01
Updated:2022-08-17
Summary:Denial of service to NT mail servers including Ipswitch, Mdaemon, and Exchange through a buffer overflow in the SMTP HELO command.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-120
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-1999-0284

Source: CCN
Type: Microsoft Personal Support Center
Support Downloads for Exchange Server

Source: XF
Type: UNKNOWN
smtp-exchangedos(344)

Source: MISC
Type: UNKNOWN
https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0284

Source: CCN
Type: Microsoft Knowledge Base Article 169174
XFOR: IMS Halts if RFC821 Address Over 1k in Size is Received

Vulnerable Configuration:Configuration 1:
  • cpe:/a:ibm:lotus_domino_mail_server:*:*:*:*:*:*:*:*
  • OR cpe:/a:microsoft:exchange_server:4.0:-:*:*:*:*:*:*
  • OR cpe:/a:microsoft:exchange_server:5.0:-:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*
  • OR cpe:/a:microsoft:exchange_server:4.0:*:*:*:*:*:*:*
  • OR cpe:/a:microsoft:exchange_server:5.0:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2000:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-1999-0284 (CCN-1720)

    Assigned:1999-02-04
    Published:1999-02-04
    Updated:1999-02-04
    Summary:SLmail is vulnerable to a denial of service attack, caused by a buffer overflow in the HELO command. A remote attacker can send the HELO command followed by a string of 819 characters or more, to overflow a buffer and consume all the processor resources on the server or cause the server to crash.
    CVSS v3 Severity:6.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): None
    User Interaction (UI): None
    Scope:Scope (S): Unchanged
    Impact Metrics:Confidentiality (C): None
    Integrity (I): Low
    Availibility (A): Low
    CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
    Exploitability Metrics:Access Vector (AV): Network
    Access Complexity (AC): Low
    Authentication (Au): None
    Impact Metrics:Confidentiality (C): Partial
    Integrity (I): Partial
    Availibility (A): Partial
    6.4 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:P)
    Exploitability Metrics:Access Vector (AV): Network
    Access Complexity (AC): Low
    Athentication (Au): None
    Impact Metrics:Confidentiality (C): None
    Integrity (I): Partial
    Availibility (A): Partial
    Vulnerability Consequences:Denial of Service
    References:Source: MITRE
    Type: CNA
    CVE-1999-0284

    Source: CCN
    Type: eEye Digital Security Team Alert AD19990204
    Multiple SLMail Vulnerabilities

    Source: CCN
    Type: Seattle Labs, Inc. Web site
    SLMail

    Source: XF
    Type: UNKNOWN
    slmail-helo-overflow(1720)

    Vulnerable Configuration:Configuration CCN 1:
  • cpe:/a:seattlelab:slmail:2.6:*:*:*:*:*:*:*
  • AND
  • cpe:/o:microsoft:windows_nt:3.51:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_95:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_98:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2000:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_me:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:2003_server:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-1999-0284 (CCN-1813)

    Assigned:1999-01-15
    Published:1999-01-15
    Updated:1999-01-15
    Summary:The Lotus Notes SMTP server is vulnerable to a denial of service attack. An attacker can send consecutive HELO commands with lengths longer than 2048 characters to crash the server.
    CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): None
    User Interaction (UI): None
    Scope:Scope (S): Unchanged
    Impact Metrics:Confidentiality (C): None
    Integrity (I): None
    Availibility (A): Low
    CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
    Exploitability Metrics:Access Vector (AV): Network
    Access Complexity (AC): Low
    Authentication (Au): None
    Impact Metrics:Confidentiality (C): Partial
    Integrity (I): Partial
    Availibility (A): Partial
    5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
    Exploitability Metrics:Access Vector (AV): Network
    Access Complexity (AC): Low
    Athentication (Au): None
    Impact Metrics:Confidentiality (C): None
    Integrity (I): None
    Availibility (A): Partial
    Vulnerability Consequences:Denial of Service
    References:Source: CCN
    Type: BugTraq Mailing List, Fri, 15 Jan 1999 00:52:53 PST
    Lotus Notes SMTP Server bug

    Source: MITRE
    Type: CNA
    CVE-1999-0284

    Source: XF
    Type: UNKNOWN
    lotus-notes-helo-crash(1813)

    Vulnerable Configuration:Configuration CCN 1:
  • cpe:/a:ibm:lotus_notes:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-1999-0284 (CCN-1834)

    Assigned:1998-03-11
    Published:1998-03-11
    Updated:1998-03-11
    Summary:MDaemon could allow a remote attacker to crash the server by sending a HELO command with a very large argument. To regain normal functionality, the server must be manually restarted.
    CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): None
    User Interaction (UI): None
    Scope:Scope (S): Unchanged
    Impact Metrics:Confidentiality (C): None
    Integrity (I): None
    Availibility (A): Low
    CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
    Exploitability Metrics:Access Vector (AV): Network
    Access Complexity (AC): Low
    Authentication (Au): None
    Impact Metrics:Confidentiality (C): Partial
    Integrity (I): Partial
    Availibility (A): Partial
    5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
    Exploitability Metrics:Access Vector (AV): Network
    Access Complexity (AC): Low
    Athentication (Au): None
    Impact Metrics:Confidentiality (C): None
    Integrity (I): None
    Availibility (A): Partial
    Vulnerability Consequences:Denial of Service
    References:Source: CCN
    Type: BugTraq Mailing List, Wed, 11 Mar 1998 00:44:45 -0600
    MDaemon SMTP Server Buffer Overflow's

    Source: MITRE
    Type: CNA
    CVE-1999-0284

    Source: CCN
    Type: MDaemon Download Page
    MDaemon POP3/SMTP Server for Windows

    Source: CCN
    Type: Rootshell Web site
    MDaemon buffer overflow

    Source: CCN
    Type: BID-8622
    Alt-N MDaemon Server SMTP HELO Argument Buffer Overflow Vulnerability

    Source: XF
    Type: UNKNOWN
    mdaemon-helo-bo(1834)

    Vulnerable Configuration:Configuration CCN 1:
  • cpe:/a:alt-n:mdaemon:*:*:*:*:*:*:*:*
  • AND
  • cpe:/o:microsoft:windows:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    ibm lotus domino mail server *
    microsoft exchange server 4.0 -
    microsoft exchange server 5.0 -
    microsoft windows nt 4.0
    microsoft exchange server 4.0
    microsoft exchange server 5.0
    microsoft windows 2000 *
    seattlelab slmail 2.6
    microsoft windows nt 3.51
    microsoft windows 95 *
    microsoft windows nt 4.0
    microsoft windows 98 *
    microsoft windows 2000 *
    microsoft windows me *
    microsoft windows 2003_server
    ibm lotus notes *
    alt-n mdaemon *
    microsoft windows *