Vulnerability Description
poprelayd script before 2.0 in Cobalt RaQ3 servers allows remote attackers to bypass authentication for relaying by causing a "POP login by user" string that includes the attacker's IP address to be injected into the maillog log file.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sun | Cobalt Raq 3I | All versions |
References
- http://archives.neohapsis.com/archives/bugtraq/2001-07/0064.htmlExploitVendor Advisory
- http://archives.neohapsis.com/archives/bugtraq/2001-07/0150.htmlPatchVendor Advisory
- http://www.securityfocus.com/bid/2986ExploitVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/6806
- http://archives.neohapsis.com/archives/bugtraq/2001-07/0064.htmlExploitVendor Advisory
- http://archives.neohapsis.com/archives/bugtraq/2001-07/0150.htmlPatchVendor Advisory
- http://www.securityfocus.com/bid/2986ExploitVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/6806
FAQ
What is CVE-2001-1075?
CVE-2001-1075 is a vulnerability with a CVSS score of 5.0 (MEDIUM). poprelayd script before 2.0 in Cobalt RaQ3 servers allows remote attackers to bypass authentication for relaying by causing a "POP login by user" string that includes the attacker's IP address to be i...
How severe is CVE-2001-1075?
CVE-2001-1075 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2001-1075?
Check the references section above for vendor advisories and patch information. Affected products include: Sun Cobalt Raq 3I.