First published: Wed Jul 04 2001(Updated: )
poprelayd script before 2.0 in Cobalt RaQ3 servers allows remote attackers to bypass authentication for relaying by causing a "POP login by user" string that includes the attacker's IP address to be injected into the maillog log file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sun Cobalt RaQ |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-1075 has a medium severity level due to its potential for remote exploitation.
To fix CVE-2001-1075, update the Cobalt RaQ3 server to a version that is patched against this vulnerability.
CVE-2001-1075 allows attackers to bypass authentication for relaying email, potentially leading to unauthorized email sending.
CVE-2001-1075 affects all configurations of Cobalt RaQ3 that are running versions before 2.0.
Yes, CVE-2001-1075 can be exploited remotely without requiring any user interaction.