NetManage Chameleon SMTPd Remote Overflow DoS

critical Nessus Plugin ID 10042


The remote SMTP server has a buffer overflow vulnerability.


The remote host appears to be running NetManage Chameleon SMTPd.

This version of the software has a remote buffer overflow vulnerability. Nessus crashed the service by issuing a long argument to the HELP command. A remote attacker could exploit this issue to crash the service, or possibly execute arbitrary code.

There is also a buffer overflow related to the HELO command, but Nessus has not checked for this issue.


Upgrade to the latest version of this software.

See Also

Plugin Details

Severity: Critical

ID: 10042

File Name: chameleon_smtpd_overflow.nasl

Version: 1.41

Type: remote

Published: 6/22/1999

Updated: 11/15/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information


Risk Factor: Low

Score: 3.6


Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

Required KB Items: Settings/ParanoidReport

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 5/4/1998

Reference Information

CVE: CVE-1999-0261

BID: 2387