First published: Mon Feb 02 1998(Updated: )
Vulnerability in imapd and ipop3d in Slackware 3.4 and 3.3 with shadowing enabled, and possibly other operating systems, allows remote attackers to cause a core dump via a short sequence of USER and PASS commands that do not provide valid usernames or passwords.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Slackware Slackware Linux | =3.4 | |
Slackware Slackware Linux | =3.3 | |
Slackware Linux | =3.3 | |
Slackware Linux | =3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-1999-1445 is classified as a moderate to high severity vulnerability due to its potential to allow remote attackers to cause a denial of service.
To remediate CVE-1999-1445, it is advised to upgrade to a patched version of Slackware or to implement workarounds that restrict the use of the USER and PASS commands.
CVE-1999-1445 affects Slackware versions 3.3 and 3.4 with shadowing enabled, and possibly other similar operating systems.
Yes, CVE-1999-1445 can be exploited remotely by sending a specific sequence of commands to the IMAP or POP3 services.
The potential impacts of CVE-1999-1445 include a core dump, which may lead to a denial of service, affecting system availability.