Description
poprelayd script before 2.0 in Cobalt RaQ3 servers allows remote attackers to bypass authentication for relaying by causing a "POP login by user" string that includes the attacker's IP address to be injected into the maillog log file.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Andrea Barisani · textremotelinux
https://www.exploit-db.com/exploits/20994
References (4)
Core 4
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/6806
Exploit, Vendor Advisory vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/2986
Exploit, Vendor Advisory mailing-list
x_refsource_bugtraq
http://archives.neohapsis.com/archives/bugtraq/2001-07/0064.html
Patch, Vendor Advisory mailing-list
x_refsource_bugtraq
http://archives.neohapsis.com/archives/bugtraq/2001-07/0150.html
Scores
EPSS
0.0387
EPSS Percentile
88.3%
Details
Status
published
Products (1)
sun/cobalt_raq_3i
Published
Jul 04, 2001
Tracked Since
Feb 18, 2026