Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-1109: Sendmail before 8.10.0 allows remote attackers to cause a denial of service by sending a series of E

0
Medium
VulnerabilityCVE-1999-1109cve-1999-1109denial of service
Published: Wed Dec 22 1999 (12/22/1999, 05:00:00 UTC)
Source: NVD
Vendor/Project: sendmail
Product: sendmail

Description

Sendmail before 8.10.0 allows remote attackers to cause a denial of service by sending a series of ETRN commands then disconnecting from the server, while Sendmail continues to process the commands after the connection has been terminated.

AI-Powered Analysis

AILast updated: 07/01/2025, 12:28:00 UTC

Technical Analysis

CVE-1999-1109 is a vulnerability in Sendmail versions prior to 8.10.0 that allows remote attackers to cause a denial of service (DoS) condition. The issue arises when an attacker sends a series of ETRN commands to the Sendmail server and then disconnects before the server finishes processing these commands. Sendmail continues to process the queued commands even after the client has disconnected, which can lead to resource exhaustion or server instability. This vulnerability does not affect confidentiality or integrity but impacts availability by potentially causing the mail server to become unresponsive or crash. The attack requires no authentication and can be executed remotely over the network, making it relatively easy to exploit. However, the vulnerability is limited to older versions of Sendmail, which have largely been replaced or updated in modern environments. The CVSS score of 5.0 (medium severity) reflects the moderate impact and ease of exploitation without authentication, but with no direct compromise of data confidentiality or integrity.

Potential Impact

For European organizations, the primary impact of this vulnerability is the disruption of email services, which are critical for business communications and operations. A successful DoS attack could lead to temporary loss of email availability, affecting internal and external communications, delaying business processes, and potentially causing reputational damage if customer communications are interrupted. Organizations relying on legacy Sendmail versions in their mail infrastructure are particularly at risk. Although modern mail servers and updated Sendmail versions mitigate this risk, some legacy systems or specialized environments may still be vulnerable. The disruption could also affect compliance with regulations requiring timely communication and incident response, such as GDPR, especially if the DoS incident delays notification or reporting processes.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Upgrade Sendmail to version 8.10.0 or later, where this vulnerability is resolved. 2) If upgrading is not immediately possible, implement network-level controls such as firewall rules or intrusion prevention systems (IPS) to detect and block suspicious sequences of ETRN commands or abnormal SMTP session behaviors. 3) Monitor mail server logs for unusual patterns of ETRN commands or abrupt disconnections that could indicate exploitation attempts. 4) Consider deploying rate limiting on SMTP commands to reduce the risk of resource exhaustion. 5) Evaluate the mail infrastructure to replace legacy Sendmail installations with modern, actively maintained mail transfer agents that have better security postures and support. 6) Conduct regular vulnerability assessments and penetration tests focusing on mail server components to identify and remediate similar issues proactively.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32cb6fd31d6ed7df539

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 7/1/2025, 12:28:00 PM

Last updated: 2/7/2026, 2:45:00 AM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats