poprelayd script before 2.0 in Cobalt RaQ3 servers allows remote attackers to bypass authentication for relaying by causing a "POP login by user" string that includes the attacker's IP address to be injected into the maillog log file.
References
Link | Resource |
---|---|
http://archives.neohapsis.com/archives/bugtraq/2001-07/0064.html | Exploit Vendor Advisory |
http://archives.neohapsis.com/archives/bugtraq/2001-07/0150.html | Patch Vendor Advisory |
http://www.securityfocus.com/bid/2986 | Exploit Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/6806 |
Configurations
Information
Published : 2001-07-03 21:00
Updated : 2017-10-09 18:29
NVD link : CVE-2001-1075
Mitre link : CVE-2001-1075
JSON object : View
CWE
Products Affected
sun
- cobalt_raq_3i