CVE-2008-0394

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Buffer overflow in Citadel SMTP server 7.10 and earlier allows remote attackers to execute arbitrary code via a long RCPT TO command, which is not properly handled by the makeuserkey function. NOTE: some of these details were obtained from third party information.

References

http://secunia.com/advisories/28590

http://www.milw0rm.com/sploits/2008-vs-GNU-citadel.tar.gz

http://www.securityfocus.com/bid/27376

http://www.securitytracker.com/id?1019255

http://www.vupen.com/english/advisories/2008/0252

https://exchange.xforce.ibmcloud.com/vulnerabilities/39807

https://www.exploit-db.com/exploits/4949

Details

Source: MITRE

Published: 2008-01-23

Updated: 2017-09-29

Type: CWE-119

Risk Information

CVSS v2

Base Score: 7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 10

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:citadel:smtp:*:*:*:*:*:*:*:* versions up to 7.10 (inclusive)

Tenable Plugins

View all (2 total)

IDNameProductFamilySeverity
30123Citadel SMTP makeuserkey Function RCPT TO Command Remote OverflowNessusSMTP problems
high
4352Citadel < 7.11 makeuserkey Function RCPT TO Command Remote OverflowNessus Network MonitorCGI
medium