MDaemon SMTP HELO Command Remote Overflow DoS

high Nessus Plugin ID 10136


The remote mail server may be affected by a buffer overflow vulnerability.


It was possible to crash the remote SMTP server by sending a too long argument to the HELO command. This allows an unauthenticated, remote attacker to deny service to legitimate users of the server.

It may also indicate the service is affected by a buffer overflow vulnerability which, if true, would allow an attacker to execute arbitrary code on the affected host, subject to the privileges under which the service operates.


Contact the vendor for a fix.

See Also

Plugin Details

Severity: High

ID: 10136

File Name: mdaemon.nasl

Version: 1.36

Type: remote

Published: 6/22/1999

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information


Risk Factor: Medium

Score: 6.0


Risk Factor: High

Base Score: 7.5

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 3/11/1998

Reference Information

CVE: CVE-1999-0284

BID: 8555, 8621, 8622