Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

CVE-2003-0540

CVE information

Published

20 years ago

Last Modified

6 years ago

CVSSv2.0 Severity

Medium

Impact Analysis

Description

The address parser code in Postfix 1.1.12 and earlier allows remote attackers to cause a denial of service (lock) via (1) a malformed envelope address to a local host that would generate a bounce and contains the ".!" string in the MAIL FROM or Errors-To headers, which causes nqmgr to lock up, or (2) via a valid MAIL FROM with a RCPT TO containing a ".!" string, which causes an instance of the SMTP listener to lock up..

CVSSv2.0 Score

Severity
Medium
Base Score
5/10
Exploit Score
10/10
Access Vector
Network
Access Complexity
Low
Authentication Required
None
Impact Score
2.9/10
Confidentiality Impact
None
Availability Impact
Partial
Integrity Impact
None

Products Affected

CPE Affected Vulnerable Excluding Edit
cpe:2.3:a:wietse_venema:postfix:1.0.21:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:wietse_venema:postfix:2001-11-15:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:wietse_venema:postfix:2000-02-28:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:wietse_venema:postfix:1999-12-31:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:conectiva:linux:8.0:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:wietse_venema:postfix:1.1.12:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:wietse_venema:postfix:1999-09-06:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:wietse_venema:postfix:1.1.11:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:conectiva:linux:7.0:*:*:*:*:*:*:*
  Yes
- -