Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2004-0833

Опубликовано: 23 дек. 2004
Источник: debian
EPSS Низкий

Описание

Sendmail before 8.12.3 on Debian GNU/Linux, when using sasl and sasl-bin, uses a Sendmail configuration script with a fixed username and password, which could allow remote attackers to use Sendmail as an open mail relay and send spam messages.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
sendmailfixed8.13.1-13package

EPSS

Процентиль: 70%
0.00664
Низкий

Связанные уязвимости

ubuntu
больше 20 лет назад

Sendmail before 8.12.3 on Debian GNU/Linux, when using sasl and sasl-bin, uses a Sendmail configuration script with a fixed username and password, which could allow remote attackers to use Sendmail as an open mail relay and send spam messages.

nvd
больше 20 лет назад

Sendmail before 8.12.3 on Debian GNU/Linux, when using sasl and sasl-bin, uses a Sendmail configuration script with a fixed username and password, which could allow remote attackers to use Sendmail as an open mail relay and send spam messages.

github
около 3 лет назад

Sendmail before 8.12.3 on Debian GNU/Linux, when using sasl and sasl-bin, uses a Sendmail configuration script with a fixed username and password, which could allow remote attackers to use Sendmail as an open mail relay and send spam messages.

EPSS

Процентиль: 70%
0.00664
Низкий