CVE-2004-0833

Sendmail before 8.12.3 on Debian GNU/Linux, when using sasl and sasl-bin, uses a Sendmail configuration script with a fixed username and password, which could allow remote attackers to use Sendmail as an open mail relay and send spam messages.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*

History

20 Nov 2024, 23:49

Type Values Removed Values Added
References () http://secunia.com/advisories/12667 - () http://secunia.com/advisories/12667 -
References () http://www.debian.org/security/2004/dsa-554 - Patch, Vendor Advisory () http://www.debian.org/security/2004/dsa-554 - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/11262 - Patch, Vendor Advisory () http://www.securityfocus.com/bid/11262 - Patch, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/17531 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/17531 -

Information

Published : 2004-12-23 05:00

Updated : 2024-11-20 23:49


NVD link : CVE-2004-0833

Mitre link : CVE-2004-0833

CVE.ORG link : CVE-2004-0833


JSON object : View

Products Affected

debian

  • debian_linux