2.1
CVSSv2

CVE-2008-7258

Published: 20/08/2010 Updated: 11/04/2024
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
VMScore: 215
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The standardise function in Anibal Monsalve Salazar sSMTP 2.61 and 2.62 allows local users to cause a denial of service (application exit) via an e-mail message containing a long line that begins with a . (dot) character. NOTE: CVE disputes this issue because it is solely a usability problem for senders of messages with certain long lines, and has no security impact

Vulnerable Product Search on Vulmon Subscribe to Product

anibal monsalve salaz ssmtp 2.61

anibal monsalve salaz ssmtp 2.62

Vendor Advisories

Debian Bug report logs - #591515 CVE-2008-7258 buffer overflow Package: ssmtp; Maintainer for ssmtp is Anibal Monsalve Salazar <anibal@debianorg>; Source for ssmtp is src:ssmtp (PTS, buildd, popcon) Reported by: Michael Gilbert <michaelsgilbert@gmailcom> Date: Tue, 3 Aug 2010 17:51:01 UTC Severity: normal Tags: ...

Exploits

source: wwwsecurityfocuscom/bid/41965/info sSMTP is prone to a remote buffer-overflow vulnerability An attacker can exploit this issue to execute arbitrary code within the context of the affected application Failed exploit attempts will result in a denial-of-service condition sSMTP 262 is vulnerable; other versions may also be affe ...