Vulnerability Description
SMTP server in SLmail 3.1 and earlier allows remote attackers to cause a denial of service via malformed commands whose arguments begin with a "(" (parenthesis) character, such as (1) SEND, (2) VRFY, (3) EXPN, (4) MAIL FROM, (5) RCPT TO.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Seatle Lab Software | Slmail | <= 3.1 |
References
- http://marc.info/?l=bugtraq&m=90649892424117&w=2
- http://marc.info/?l=ntbugtraq&m=90650438826447&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/1664
- http://marc.info/?l=bugtraq&m=90649892424117&w=2
- http://marc.info/?l=ntbugtraq&m=90650438826447&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/1664
FAQ
What is CVE-1999-1265?
CVE-1999-1265 is a vulnerability with a CVSS score of 5.0 (MEDIUM). SMTP server in SLmail 3.1 and earlier allows remote attackers to cause a denial of service via malformed commands whose arguments begin with a "(" (parenthesis) character, such as (1) SEND, (2) VRFY, ...
How severe is CVE-1999-1265?
CVE-1999-1265 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-1999-1265?
Check the references section above for vendor advisories and patch information. Affected products include: Seatle Lab Software Slmail.