CVE-2008-2784

Current Description

The smtp_filter function in spamdyke before 3.1.8 does not filter RCPT commands after encountering the first DATA command, which allows remote attackers to use the server as an open mail relay by sending RCPT commands with invalid recipients, followed by a DATA command, followed by arbitrary RCPT commands and a second DATA command.

Basic Data

PublishedJune 19, 2008
Last ModifiedAugust 08, 2017
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-264
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:N/I:P/A:P
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactNONE
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score6.4
SeverityMEDIUM
Exploitability Score10.0
Impact Score4.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationSpamdykeSpamdyke3.0.0*******
    2.3ApplicationSpamdykeSpamdyke3.0.1*******
    2.3ApplicationSpamdykeSpamdyke3.1.0*******
    2.3ApplicationSpamdykeSpamdyke3.1.1*******
    2.3ApplicationSpamdykeSpamdyke3.1.2*******
    2.3ApplicationSpamdykeSpamdyke3.1.3*******
    2.3ApplicationSpamdykeSpamdyke3.1.4*******
    2.3ApplicationSpamdykeSpamdyke3.1.5*******
    2.3ApplicationSpamdykeSpamdyke3.1.6*******
    2.3ApplicationSpamdykeSpamdyke3.1.7*******

Vulnerable Software List

VendorProductVersions
Spamdyke Spamdyke 3.0.0, 3.0.1, 3.1.0, 3.1.1, 3.1.2, 3.1.3, 3.1.4, 3.1.5, 3.1.6, 3.1.7

References

NameSourceURLTags
30408http://secunia.com/advisories/30408SECUNIAVendor Advisory
http://www.spamdyke.org/documentation/Changelog.txthttp://www.spamdyke.org/documentation/Changelog.txtCONFIRM
ADV-2008-1684http://www.vupen.com/english/advisories/2008/1684/referencesVUPEN
spamdyke-smtpfilter-security-bypass(42658)https://exchange.xforce.ibmcloud.com/vulnerabilities/42658XF