Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2008-7258
Deferred
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-20 Aug, 2010 | 18:00
Updated At-11 Apr, 2025 | 00:51

The standardise function in Anibal Monsalve Salazar sSMTP 2.61 and 2.62 allows local users to cause a denial of service (application exit) via an e-mail message containing a long line that begins with a . (dot) character. NOTE: CVE disputes this issue because it is solely a usability problem for senders of messages with certain long lines, and has no security impact

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.02.1LOW
AV:L/AC:L/Au:N/C:N/I:N/A:P
Primary2.02.1LOW
AV:L/AC:L/Au:N/C:N/I:N/A:P
CPE Matches

anibal_monsalve_salaz
anibal_monsalve_salaz
>>ssmtp>>2.61
cpe:2.3:a:anibal_monsalve_salaz:ssmtp:2.61:*:*:*:*:*:*:*
anibal_monsalve_salaz
anibal_monsalve_salaz
>>ssmtp>>2.62
cpe:2.3:a:anibal_monsalve_salaz:ssmtp:2.62:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-20Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://lists.fedoraproject.org/pipermail/package-announce/2010-August/045407.htmlcve@mitre.org
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2010-August/045422.htmlcve@mitre.org
N/A
http://marc.info/?l=oss-security&m=128013391907262&w=2cve@mitre.org
Exploit
http://marc.info/?l=oss-security&m=128017258305041&w=2cve@mitre.org
Exploit
http://marc.info/?l=oss-security&m=128077707318085&w=2cve@mitre.org
N/A
http://patch-tracker.debian.org/patch/series/view/ssmtp/2.62-3/345780-standardise-bufsizecve@mitre.org
Patch
http://secunia.com/advisories/41009cve@mitre.org
N/A
http://www.openwall.com/lists/oss-security/2010/08/19/6cve@mitre.org
Exploit
http://www.securityfocus.com/bid/41965cve@mitre.org
Exploit
https://bugs.launchpad.net/ubuntu/+source/ssmtp/+bug/282424cve@mitre.org
N/A
https://bugzilla.redhat.com/show_bug.cgi?id=582236cve@mitre.org
Exploit
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2008-7258cve@mitre.org
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2010-August/045407.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2010-August/045422.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=oss-security&m=128013391907262&w=2af854a3a-2127-422b-91ae-364da2661108
Exploit
http://marc.info/?l=oss-security&m=128017258305041&w=2af854a3a-2127-422b-91ae-364da2661108
Exploit
http://marc.info/?l=oss-security&m=128077707318085&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://patch-tracker.debian.org/patch/series/view/ssmtp/2.62-3/345780-standardise-bufsizeaf854a3a-2127-422b-91ae-364da2661108
Patch
http://secunia.com/advisories/41009af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.openwall.com/lists/oss-security/2010/08/19/6af854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.securityfocus.com/bid/41965af854a3a-2127-422b-91ae-364da2661108
Exploit
https://bugs.launchpad.net/ubuntu/+source/ssmtp/+bug/282424af854a3a-2127-422b-91ae-364da2661108
N/A
https://bugzilla.redhat.com/show_bug.cgi?id=582236af854a3a-2127-422b-91ae-364da2661108
Exploit
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2008-7258af854a3a-2127-422b-91ae-364da2661108
N/A
Change History
0Changes found

Details not found