First published: Thu Jun 01 2000(Updated: )
Buffer overflow in the NetWin DSMTP 2.7q in the NetWin dmail package allows remote attackers to execute arbitrary commands via a long ETRN request.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NetWin dMail | =2.7 | |
NetWin dMail | =2.7q | |
NetWin dMail | =2.8e | |
NetWin dMail | =2.8f | |
NetWin dMail | =2.8g | |
NetWin dMail | =2.8h |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2000-0490 is considered critical as it allows remote attackers to execute arbitrary commands.
To mitigate CVE-2000-0490, upgrade the NetWin DSMTP package to a version that includes the patch against this vulnerability.
CVE-2000-0490 affects NetWin dmail versions 2.7q, 2.7, 2.8e, 2.8f, 2.8g, and 2.8h.
CVE-2000-0490 facilitates a buffer overflow attack through a maliciously crafted long ETRN request.
As a temporary measure, disabling the ETRN command can serve as a workaround until the software is updated.