First published: Fri Nov 19 2004(Updated: )
Sendmail before 8.12.3 on Debian GNU/Linux, when using sasl and sasl-bin, uses a Sendmail configuration script with a fixed username and password, which could allow remote attackers to use Sendmail as an open mail relay and send spam messages.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2004-0833 is considered high due to its potential to allow unauthorized remote access and the use of Sendmail as an open mail relay.
To fix CVE-2004-0833, update Sendmail to version 8.12.3 or later or configure Sendmail to avoid the use of fixed usernames and passwords.
CVE-2004-0833 affects Debian GNU/Linux versions prior to 8.12.3, specifically version 3.0 across various architectures.
CVE-2004-0833 is a configuration vulnerability that can lead to unauthorized use of Sendmail as an open mail relay.
Yes, CVE-2004-0833 can be exploited remotely, allowing attackers to send spam messages leveraging the open mail relay.