2024-12-08 03:06:42 +00:00

112 lines
3.6 KiB
JSON

{
"id": "CVE-2019-13612",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-07-16T13:15:11.473",
"lastModified": "2024-11-21T04:25:21.267",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "MDaemon Email Server 19 through 20.0.1 skips SpamAssassin checks by default for e-mail messages larger than 2 MB (and limits checks to 10 MB even with special configuration), which is arguably inconsistent with currently popular message sizes. This might interfere with risk management for malicious e-mail, if a customer deploys a server with sufficient resources to scan large messages."
},
{
"lang": "es",
"value": "MDaemon Email Server versi\u00f3n 19 hasta la versi\u00f3n 20.0.1 omite las comprobaciones de SpamAssassin por defecto para los mensajes de correo electr\u00f3nico superiores a 2 MB (y limita las comprobaciones para 10 MB incluso con configuraci\u00f3n especial), que podr\u00eda decirse, es inconsistente con los tama\u00f1os de mensajes m\u00e1s populares hoy en d\u00eda. Esto podr\u00eda interferir con la administraci\u00f3n de riesgos para el correo electr\u00f3nico malicioso, si un cliente implementa un servidor con recursos suficientes para analizar mensajes grandes"
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:altn:mdaemon_email_server:19:*:*:*:*:*:*:*",
"matchCriteriaId": "87A085E8-CD91-476B-8D59-2AE0B7A31E12"
}
]
}
]
}
],
"references": [
{
"url": "http://lists.altn.com/WebX/.59862f3c",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://lists.altn.com/WebX/.59862f3c",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}