CVE-2001-1075

poprelayd script before 2.0 in Cobalt RaQ3 servers allows remote attackers to bypass authentication for relaying by causing a "POP login by user" string that includes the attacker's IP address to be injected into the maillog log file.
Configurations

Configuration 1 (hide)

cpe:2.3:h:sun:cobalt_raq_3i:*:*:*:*:*:*:*:*

History

20 Nov 2024, 23:36

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/bugtraq/2001-07/0064.html - Exploit, Vendor Advisory () http://archives.neohapsis.com/archives/bugtraq/2001-07/0064.html - Exploit, Vendor Advisory
References () http://archives.neohapsis.com/archives/bugtraq/2001-07/0150.html - Patch, Vendor Advisory () http://archives.neohapsis.com/archives/bugtraq/2001-07/0150.html - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/2986 - Exploit, Vendor Advisory () http://www.securityfocus.com/bid/2986 - Exploit, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/6806 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/6806 -

Information

Published : 2001-07-04 04:00

Updated : 2024-11-20 23:36


NVD link : CVE-2001-1075

Mitre link : CVE-2001-1075

CVE.ORG link : CVE-2001-1075


JSON object : View

Products Affected

sun

  • cobalt_raq_3i