CVE-2019-13612
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
MDaemon Email Server 19 through 20.0.1 skips SpamAssassin checks by default for e-mail messages larger than 2 MB (and limits checks to 10 MB even with special configuration), which is arguably inconsistent with currently popular message sizes. This might interfere with risk management for malicious e-mail, if a customer deploys a server with sufficient resources to scan large messages.
MDaemon Email Server versión 19 hasta la versión 20.0.1 omite las comprobaciones de SpamAssassin por defecto para los mensajes de correo electrónico superiores a 2 MB (y limita las comprobaciones para 10 MB incluso con configuración especial), que podría decirse, es inconsistente con los tamaños de mensajes más populares hoy en día. Esto podría interferir con la administración de riesgos para el correo electrónico malicioso, si un cliente implementa un servidor con recursos suficientes para analizar mensajes grandes
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-07-16 CVE Reserved
- 2019-07-16 CVE Published
- 2023-03-07 EPSS Updated
- 2024-08-04 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-20: Improper Input Validation
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.altn.com/WebX/.59862f3c | 2020-08-26 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Altn Search vendor "Altn" | Mdaemon Email Server Search vendor "Altn" for product "Mdaemon Email Server" | 19 Search vendor "Altn" for product "Mdaemon Email Server" and version "19" | - |
Affected
|