CVE-2008-2784

The smtp_filter function in spamdyke before 3.1.8 does not filter RCPT commands after encountering the first DATA command, which allows remote attackers to use the server as an open mail relay by sending RCPT commands with invalid recipients, followed by a DATA command, followed by arbitrary RCPT commands and a second DATA command.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:spamdyke:spamdyke:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:spamdyke:spamdyke:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:spamdyke:spamdyke:3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:spamdyke:spamdyke:3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:spamdyke:spamdyke:3.1.2:*:*:*:*:*:*:*
cpe:2.3:a:spamdyke:spamdyke:3.1.3:*:*:*:*:*:*:*
cpe:2.3:a:spamdyke:spamdyke:3.1.4:*:*:*:*:*:*:*
cpe:2.3:a:spamdyke:spamdyke:3.1.5:*:*:*:*:*:*:*
cpe:2.3:a:spamdyke:spamdyke:3.1.6:*:*:*:*:*:*:*
cpe:2.3:a:spamdyke:spamdyke:3.1.7:*:*:*:*:*:*:*

History

21 Nov 2024, 00:47

Type Values Removed Values Added
References () http://secunia.com/advisories/30408 - Vendor Advisory () http://secunia.com/advisories/30408 - Vendor Advisory
References () http://www.spamdyke.org/documentation/Changelog.txt - () http://www.spamdyke.org/documentation/Changelog.txt -
References () http://www.vupen.com/english/advisories/2008/1684/references - () http://www.vupen.com/english/advisories/2008/1684/references -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/42658 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/42658 -

Information

Published : 2008-06-19 20:41

Updated : 2024-11-21 00:47


NVD link : CVE-2008-2784

Mitre link : CVE-2008-2784

CVE.ORG link : CVE-2008-2784


JSON object : View

Products Affected

spamdyke

  • spamdyke
CWE
CWE-264

Permissions, Privileges, and Access Controls