Multiple MTA HELO Command Remote Overflow

high Nessus Plugin ID 10260

Synopsis

The remote SMTP server is vulnerable to an access control breach.

Description

The remote SMTP server seems to allow remote users to send mail anonymously by providing arguments that are too long to the HELO command (more than 1024 chars).

This problem may allow malicious users to send unsolicited mail (i.e., SPAM) or threatening mail using the server, and keep their anonymity.

Solution

If sendmail is being used, upgrade to version 8.9.x or newer.
If you do not run sendmail, contact your vendor.

See Also

https://marc.info/?l=bugtraq&m=90221101925991&w=2

Plugin Details

Severity: High

ID: 10260

File Name: smtp_helo.nasl

Version: 1.49

Type: remote

Published: 8/18/1999

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

Required KB Items: SMTP/sendmail

Excluded KB Items: SMTP/wrapped, SMTP/qmail, SMTP/microsoft_esmtp_5, SMTP/postfix, SMTP/domino

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 1/10/1998

Reference Information

CVE: CVE-1999-0098, CVE-1999-1015, CVE-1999-1504

BID: 49431, 61, 62