Vulnerability Name: | CVE-1999-0512 (CCN-2257) | ||||||||
Assigned: | 1999-01-01 | ||||||||
Published: | 1999-01-01 | ||||||||
Updated: | 2022-08-17 | ||||||||
Summary: | A mail server is explicitly configured to allow SMTP mail relay, which allows abuse by spammers. | ||||||||
CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||
CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C) 7.4 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
7.4 High (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Bypass Security | ||||||||
References: | Source: MITRE Type: CNA CVE-1999-0512 Source: CCN Type: NTHELP.COM Web site NTMail version 3 relay problem Source: CCN Type: Gordano Ltd. Web site NTMail Source: XF Type: UNKNOWN ntmail-relay(2257) Source: MISC Type: UNKNOWN https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0512 | ||||||||
Vulnerable Configuration: | Configuration CCN 1: Denotes that component is vulnerable | ||||||||
Vulnerability Name: | CVE-1999-0512 (CCN-4342) | ||||||||
Assigned: | 2000-04-20 | ||||||||
Published: | 2000-04-20 | ||||||||
Updated: | 2000-04-20 | ||||||||
Summary: | The default Sendmail configuration in SCO UnixWare and SCO OpenServer allows SMTP message relaying. If the SMTP anti-relay feature is not enabled, malicious users can send spam email through your mail server, increasing the amount of traffic on the server. | ||||||||
CVSS v3 Severity: | 4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
| ||||||||
CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||
Vulnerability Consequences: | Configuration | ||||||||
References: | Source: MITRE Type: CNA CVE-1999-0512 Source: CCN Type: Request for Comment document RFC 2505 Anti-Spam Recommendations for SMTP MTAs Source: CCN Type: SCO Security Web site Security Fixes Source: XF Type: UNKNOWN sco-sendmail-spam(4342) | ||||||||
Vulnerable Configuration: | Configuration CCN 1: Denotes that component is vulnerable | ||||||||
Vulnerability Name: | CVE-1999-0512 (CCN-4343) | ||||||||
Assigned: | 2000-04-20 | ||||||||
Published: | 2000-04-20 | ||||||||
Updated: | 2000-04-20 | ||||||||
Summary: | The default MMDF configuration in SCO UnixWare and SCO OpenServer allows SMTP message relaying. If the SMTP anti-relay feature is not enabled, malicious users can send spam email through your mail server, increasing the amount of traffic on the server. | ||||||||
CVSS v3 Severity: | 4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
| ||||||||
CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||
Vulnerability Consequences: | Configuration | ||||||||
References: | Source: MITRE Type: CNA CVE-1999-0512 Source: CCN Type: Request for Comment document RFC 2505 Anti-Spam Recommendations for SMTP MTAs Source: CCN Type: SCO Technical Articles How to configure MMDF to control mail routing on a per-host basis. Source: CCN Type: SCO Security Web site Security Fixes Source: XF Type: UNKNOWN sco-openserver-mmdf-spam(4343) | ||||||||
Vulnerable Configuration: | Configuration CCN 1: Denotes that component is vulnerable | ||||||||
BACK |