Vulnerability Description
Computalynx CMail 2.4 and CMail 2.3 SP2 SMTP servers are vulnerable to a buffer overflow attack in the MAIL FROM command that may allow a remote attacker to execute arbitrary code on the server.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Computalynx | Cmail | 2.3sp2 |
References
- http://marc.info/?l=bugtraq&m=93720402717560&w=2
- http://marc.info/?l=bugtraq&m=94121824921783&w=2
- http://www.securityfocus.com/bid/633ExploitVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/2240
- http://marc.info/?l=bugtraq&m=93720402717560&w=2
- http://marc.info/?l=bugtraq&m=94121824921783&w=2
- http://www.securityfocus.com/bid/633ExploitVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/2240
FAQ
What is CVE-1999-1521?
CVE-1999-1521 is a vulnerability with a CVSS score of 10.0 (HIGH). Computalynx CMail 2.4 and CMail 2.3 SP2 SMTP servers are vulnerable to a buffer overflow attack in the MAIL FROM command that may allow a remote attacker to execute arbitrary code on the server.
How severe is CVE-1999-1521?
CVE-1999-1521 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-1999-1521?
Check the references section above for vendor advisories and patch information. Affected products include: Computalynx Cmail.