Lucene search

K
cve[email protected]CVE-2002-1278
HistorySep 01, 2004 - 4:00 a.m.

CVE-2002-1278

2004-09-0104:00:00
web.nvd.nist.gov
92
linuxconf
sendmail
configuration
vulnerability
open mail relay
security issue

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

4.6 Medium

AI Score

Confidence

High

0.014 Low

EPSS

Percentile

86.4%

The mailconf module in Linuxconf 1.24, and other versions before 1.28, on Conectiva Linux 6.0 through 8, and possibly other distributions, generates the Sendmail configuration file (sendmail.cf) in a way that configures Sendmail to run as an open mail relay, which allows remote attackers to send Spam email.

Affected configurations

NVD
Node
jacques_gelinaslinuxconfMatch1.2.4r2
OR
jacques_gelinaslinuxconfMatch1.2.5r3

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

4.6 Medium

AI Score

Confidence

High

0.014 Low

EPSS

Percentile

86.4%

Related for CVE-2002-1278