First published: Wed Jul 04 2001(Updated: )
poprelayd script before 2.0 in Cobalt RaQ3 servers allows remote attackers to bypass authentication for relaying by causing a "POP login by user" string that includes the attacker's IP address to be injected into the maillog log file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sun Cobalt Raq 3i |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.