Description
The standardise function in Anibal Monsalve Salazar sSMTP 2.61 and 2.62 allows local users to cause a denial of service (application exit) via an e-mail message containing a long line that begins with a . (dot) character. NOTE: CVE disputes this issue because it is solely a usability problem for senders of messages with certain long lines, and has no security impact
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Brendan Boerner · textdoslinux
https://www.exploit-db.com/exploits/34375
References (12)
Core 12
Core References
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/41965
Issue Tracking x_refsource_misc
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2008-7258
Mailing List, Third Party Advisory vendor-advisory
x_refsource_fedora
http://lists.fedoraproject.org/pipermail/package-announce/2010-August/045422.html
Patch x_refsource_confirm
http://patch-tracker.debian.org/patch/series/view/ssmtp/2.62-3/345780-standardise-bufsize
Exploit mailing-list
x_refsource_mlist
http://marc.info/?l=oss-security&m=128017258305041&w=2
Exploit mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2010/08/19/6
Mailing List, Third Party Advisory vendor-advisory
x_refsource_fedora
http://lists.fedoraproject.org/pipermail/package-announce/2010-August/045407.html
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/41009
Issue Tracking x_refsource_confirm
https://bugs.launchpad.net/ubuntu/+source/ssmtp/+bug/282424
Exploit x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=582236
Exploit mailing-list
x_refsource_mlist
http://marc.info/?l=oss-security&m=128013391907262&w=2
Mailing List mailing-list
x_refsource_mlist
http://marc.info/?l=oss-security&m=128077707318085&w=2
Scores
EPSS
0.0005
EPSS Percentile
15.2%
Details
CWE
CWE-20
Status
published
Products (2)
anibal_monsalve_salaz/ssmtp
2.61
anibal_monsalve_salaz/ssmtp
2.62
Published
Aug 20, 2010
Tracked Since
Feb 18, 2026