First published: Fri Jun 30 2000(Updated: )
vchkpw program in vpopmail before version 4.8 does not properly cleanse an untrusted format string used in a call to syslog, which allows remote attackers to cause a denial of service via a USER or PASS command that contains arbitrary formatting directives.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Inter7 Vpopmail | =4.5 | |
Inter7 Vpopmail | =4.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2000-0583 is classified as a moderate severity vulnerability due to its potential for denial of service.
To fix CVE-2000-0583, upgrade to vpopmail version 4.8 or later, which addresses this vulnerability.
CVE-2000-0583 affects vpopmail versions 4.5 and 4.7.
Yes, CVE-2000-0583 can be exploited remotely through specially crafted USER or PASS commands.
The impact of CVE-2000-0583 is a denial of service, causing the affected system to become unresponsive.