First published: Tue Aug 18 2009(Updated: )
Plesk 8.6.0, when short mail login names (SHORTNAMES) are enabled, allows remote attackers to bypass authentication and send spam e-mail via a message with (1) a base64-encoded username that begins with a valid shortname, or (2) a username that matches a valid password, as demonstrated using (a) SMTP and qmail, and (b) Courier IMAP and POP3.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Plesk Obsidian | =8.6.0 | |
Plesk Obsidian | =8.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-6984 has a moderate severity level due to its ability to allow remote attackers to bypass authentication.
To fix CVE-2008-6984, upgrade to a newer version of Plesk that addresses this vulnerability.
CVE-2008-6984 specifically affects Plesk version 8.6.0 on both Windows and Linux/Unix platforms.
Yes, CVE-2008-6984 can be exploited remotely by attackers to send spam emails.
CVE-2008-6984 allows attackers to send spam emails by bypassing authentication through specific username manipulations.