CVE-2008-7258

The standardise function in Anibal Monsalve Salazar sSMTP 2.61 and 2.62 allows local users to cause a denial of service (application exit) via an e-mail message containing a long line that begins with a . (dot) character. NOTE: CVE disputes this issue because it is solely a usability problem for senders of messages with certain long lines, and has no security impact
References
Link Resource
http://lists.fedoraproject.org/pipermail/package-announce/2010-August/045407.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-August/045422.html
http://marc.info/?l=oss-security&m=128013391907262&w=2 Exploit
http://marc.info/?l=oss-security&m=128017258305041&w=2 Exploit
http://marc.info/?l=oss-security&m=128077707318085&w=2
http://patch-tracker.debian.org/patch/series/view/ssmtp/2.62-3/345780-standardise-bufsize Patch
http://secunia.com/advisories/41009
http://www.openwall.com/lists/oss-security/2010/08/19/6 Exploit
http://www.securityfocus.com/bid/41965 Exploit
https://bugs.launchpad.net/ubuntu/+source/ssmtp/+bug/282424
https://bugzilla.redhat.com/show_bug.cgi?id=582236 Exploit
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2008-7258
http://lists.fedoraproject.org/pipermail/package-announce/2010-August/045407.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-August/045422.html
http://marc.info/?l=oss-security&m=128013391907262&w=2 Exploit
http://marc.info/?l=oss-security&m=128017258305041&w=2 Exploit
http://marc.info/?l=oss-security&m=128077707318085&w=2
http://patch-tracker.debian.org/patch/series/view/ssmtp/2.62-3/345780-standardise-bufsize Patch
http://secunia.com/advisories/41009
http://www.openwall.com/lists/oss-security/2010/08/19/6 Exploit
http://www.securityfocus.com/bid/41965 Exploit
https://bugs.launchpad.net/ubuntu/+source/ssmtp/+bug/282424
https://bugzilla.redhat.com/show_bug.cgi?id=582236 Exploit
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2008-7258
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:anibal_monsalve_salaz:ssmtp:2.61:*:*:*:*:*:*:*
cpe:2.3:a:anibal_monsalve_salaz:ssmtp:2.62:*:*:*:*:*:*:*

History

21 Nov 2024, 00:58

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-August/045407.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-August/045407.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-August/045422.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-August/045422.html -
References () http://marc.info/?l=oss-security&m=128013391907262&w=2 - Exploit () http://marc.info/?l=oss-security&m=128013391907262&w=2 - Exploit
References () http://marc.info/?l=oss-security&m=128017258305041&w=2 - Exploit () http://marc.info/?l=oss-security&m=128017258305041&w=2 - Exploit
References () http://marc.info/?l=oss-security&m=128077707318085&w=2 - () http://marc.info/?l=oss-security&m=128077707318085&w=2 -
References () http://patch-tracker.debian.org/patch/series/view/ssmtp/2.62-3/345780-standardise-bufsize - Patch () http://patch-tracker.debian.org/patch/series/view/ssmtp/2.62-3/345780-standardise-bufsize - Patch
References () http://secunia.com/advisories/41009 - () http://secunia.com/advisories/41009 -
References () http://www.openwall.com/lists/oss-security/2010/08/19/6 - Exploit () http://www.openwall.com/lists/oss-security/2010/08/19/6 - Exploit
References () http://www.securityfocus.com/bid/41965 - Exploit () http://www.securityfocus.com/bid/41965 - Exploit
References () https://bugs.launchpad.net/ubuntu/+source/ssmtp/+bug/282424 - () https://bugs.launchpad.net/ubuntu/+source/ssmtp/+bug/282424 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=582236 - Exploit () https://bugzilla.redhat.com/show_bug.cgi?id=582236 - Exploit
References () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2008-7258 - () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2008-7258 -

07 Nov 2023, 02:03

Type Values Removed Values Added
Summary ** DISPUTED ** The standardise function in Anibal Monsalve Salazar sSMTP 2.61 and 2.62 allows local users to cause a denial of service (application exit) via an e-mail message containing a long line that begins with a . (dot) character. NOTE: CVE disputes this issue because it is solely a usability problem for senders of messages with certain long lines, and has no security impact. The standardise function in Anibal Monsalve Salazar sSMTP 2.61 and 2.62 allows local users to cause a denial of service (application exit) via an e-mail message containing a long line that begins with a . (dot) character. NOTE: CVE disputes this issue because it is solely a usability problem for senders of messages with certain long lines, and has no security impact

Information

Published : 2010-08-20 18:00

Updated : 2025-04-11 00:51


NVD link : CVE-2008-7258

Mitre link : CVE-2008-7258

CVE.ORG link : CVE-2008-7258


JSON object : View

Products Affected

anibal_monsalve_salaz

  • ssmtp
CWE
CWE-20

Improper Input Validation