poprelayd script before 2.0 in Cobalt RaQ3 servers allows remote attackers to bypass authentication for relaying by causing a "POP login by user" string that includes the attacker's IP address to be injected into the maillog log file.Referenceshttps://exchange.xforce.ibmcloud.com/vulnerabilities/6806http://www.securityfocus.com/bid/2986http://archives.neohapsis.com/archives/bugtraq/2001-07/0064.htmlhttp://archives.neohapsis.com/archives/bugtraq/2001-07/0150.html