Skip to main content

CVE-1999-0144: Denial of service in Qmail by specifying a large number of recipients with the RCPT command.

Low
VulnerabilityCVE-1999-0144cve-1999-0144denial of service
Published: Sun Jun 01 1997 (06/01/1997, 04:00:00 UTC)
Source: NVD
Vendor/Project: qmail_project
Product: qmail

Description

Denial of service in Qmail by specifying a large number of recipients with the RCPT command.

AI-Powered Analysis

AILast updated: 07/01/2025, 23:55:54 UTC

Technical Analysis

CVE-1999-0144 is a denial of service (DoS) vulnerability affecting the qmail mail transfer agent (MTA). The vulnerability arises when an attacker sends an SMTP RCPT command with an excessively large number of recipients. Qmail processes each recipient individually, and specifying a very large number of recipients causes resource exhaustion, leading to a denial of service condition. This vulnerability does not affect confidentiality or integrity but impacts availability by potentially causing the mail server to become unresponsive or crash. The vulnerability was published in 1997 and has a low CVSS score of 2.1, reflecting its limited impact and difficulty of exploitation. No patches are available, and there are no known exploits in the wild. The vulnerability requires local access to the mail server’s SMTP interface but does not require authentication. Given the age of the vulnerability and the lack of patches, modern qmail deployments or alternative MTAs are likely to have mitigations or be unaffected. However, legacy systems still running unpatched qmail versions remain vulnerable to resource exhaustion attacks via SMTP.

Potential Impact

For European organizations, the primary impact of this vulnerability is service disruption of mail infrastructure relying on vulnerable qmail versions. Disruption of email services can affect business communications, customer support, and internal operations, leading to productivity loss and potential reputational damage. However, since the vulnerability only causes denial of service and does not allow data breach or privilege escalation, the impact on confidentiality and integrity is minimal. Organizations using qmail in critical communication roles or those with legacy systems may experience temporary outages if targeted. The low severity and lack of known exploits reduce the likelihood of widespread attacks, but targeted disruption remains possible, especially for organizations with exposed SMTP services and insufficient rate limiting or filtering.

Mitigation Recommendations

European organizations should verify if qmail is in use within their mail infrastructure, particularly legacy systems. If qmail is deployed, administrators should implement SMTP rate limiting to restrict the number of RCPT commands accepted per session or per source IP to prevent resource exhaustion. Network-level filtering and connection throttling can also mitigate abuse. Migrating to modern, actively maintained mail servers with built-in protections against such DoS vectors is recommended. Monitoring mail server logs for unusual spikes in RCPT commands or connection attempts can provide early detection of exploitation attempts. Since no patches exist for this vulnerability, operational controls and infrastructure upgrades are the primary mitigation strategies. Additionally, restricting SMTP access to trusted networks or authenticated users reduces exposure.

Need more detailed analysis?Get Pro

Threat ID: 682ca32ab6fd31d6ed7de6e9

Added to database: 5/20/2025, 3:43:38 PM

Last enriched: 7/1/2025, 11:55:54 PM

Last updated: 8/14/2025, 10:09:53 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats