mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
132 lines
4.5 KiB
JSON
132 lines
4.5 KiB
JSON
{
|
|
"id": "CVE-2008-2784",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2008-06-19T20:41:00.000",
|
|
"lastModified": "2017-08-08T01:31:19.513",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The smtp_filter function in spamdyke before 3.1.8 does not filter RCPT commands after encountering the first DATA command, which allows remote attackers to use the server as an open mail relay by sending RCPT commands with invalid recipients, followed by a DATA command, followed by arbitrary RCPT commands and a second DATA command."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "La funci\u00f3n smtp_filter en spamdyke versiones anteriores a la 3.1.8 no filtra comandos RCPT despu\u00e9s de encontrar el primer comando DATA, lo cual permite a atacantes remotos usar el servidor de open relay enviando comandos RCTP con destinatarios no v\u00e1lidos, seguidos de un comando DATA, seguido de comandos RCPT arbitrarios y un segundo comando DATA."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 6.4
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 4.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-264"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spamdyke:spamdyke:3.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "07A0ACF5-C979-47F9-9BEB-D6C45604F536"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spamdyke:spamdyke:3.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B1BAFC19-C601-46EF-8830-9B0990C0F5B3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spamdyke:spamdyke:3.1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3F28F91C-A3FB-4130-B256-550FB8A9565F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spamdyke:spamdyke:3.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3E64D359-91C8-43AD-A20E-0789AE496CB8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spamdyke:spamdyke:3.1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9633F036-B7C1-4108-AAAB-841A67E59346"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spamdyke:spamdyke:3.1.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1127C109-252C-41F1-B6E3-F88D7AA1D95B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spamdyke:spamdyke:3.1.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3683DA2F-E22A-427E-A5E1-1FDC8676FFF7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spamdyke:spamdyke:3.1.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "02D659E2-36DD-4B20-A471-AC46BE39148A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spamdyke:spamdyke:3.1.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "50C05EBB-5061-49CC-B68C-ADC05A7DEF63"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:spamdyke:spamdyke:3.1.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5D93F2E1-ACAB-4AF5-BA35-43E88B2EB7B0"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.spamdyke.org/documentation/Changelog.txt",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2008/1684/references",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42658",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |