CVE-2008-7258

Anibal Monsalve Salazar sSMTP 2.61-2.62 - DoS

Title source: llm
STIX 2.1

Description

The standardise function in Anibal Monsalve Salazar sSMTP 2.61 and 2.62 allows local users to cause a denial of service (application exit) via an e-mail message containing a long line that begins with a . (dot) character. NOTE: CVE disputes this issue because it is solely a usability problem for senders of messages with certain long lines, and has no security impact

Exploits (1)

exploitdb WORKING POC VERIFIED
by Brendan Boerner · textdoslinux
https://www.exploit-db.com/exploits/34375

References (12)

Core 12
Core References
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/41965
Mailing List, Third Party Advisory vendor-advisory x_refsource_fedora
http://lists.fedoraproject.org/pipermail/package-announce/2010-August/045422.html
Exploit mailing-list x_refsource_mlist
http://marc.info/?l=oss-security&m=128017258305041&w=2
Exploit mailing-list x_refsource_mlist
http://www.openwall.com/lists/oss-security/2010/08/19/6
Mailing List, Third Party Advisory vendor-advisory x_refsource_fedora
http://lists.fedoraproject.org/pipermail/package-announce/2010-August/045407.html
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/41009
Exploit mailing-list x_refsource_mlist
http://marc.info/?l=oss-security&m=128013391907262&w=2
Mailing List mailing-list x_refsource_mlist
http://marc.info/?l=oss-security&m=128077707318085&w=2

Scores

EPSS 0.0005
EPSS Percentile 15.2%

Details

CWE
CWE-20
Status published
Products (2)
anibal_monsalve_salaz/ssmtp 2.61
anibal_monsalve_salaz/ssmtp 2.62
Published Aug 20, 2010
Tracked Since Feb 18, 2026