FreeBSD : spamdyke -- open relay (555ac165-2bee-11dd-bbdc-00e0815b8da8)

Medium Nessus Plugin ID 32449


The remote FreeBSD host is missing a security-related update.


Spamdyke Team reports :

Fixed smtp_filter() to reject the DATA command if no valid recipients have been specified. Otherwise, a specific scenario could result in every spamdyke installation being used as an open relay. If the remote server connects and gives one or more recipients that are rejected (for relaying or blacklisting), then gives the DATA command, spamdyke will ignore all other commands, assuming that message data is being transmitted. However, because all of the recipients were rejected, qmail will reject the DATA command. From that point on, the remote server can give as many recipients as it likes and spamdyke will ignore them all -- they will not be filtered at all. After that, the remote server can give the DATA command and send the actual message data. Because spamdyke is controlling relaying, the RELAYCLIENT environment variable is set and qmail won't check for relaying either.
Thanks to Mirko Buffoni for reporting this one.


Update the affected package.

See Also

Plugin Details

Severity: Medium

ID: 32449

File Name: freebsd_pkg_555ac1652bee11ddbbdc00e0815b8da8.nasl

Version: $Revision: 1.11 $

Type: local

Published: 2008/05/28

Modified: 2013/06/21

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 6.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:spamdyke, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2008/05/27

Vulnerability Publication Date: 2008/05/21

Reference Information

CVE: CVE-2008-2784

CWE: 264