MDaemon Webconfig IMAP Malformed URL DoS

medium Nessus Plugin ID 14826

Synopsis

The remote mail server is affected by a denial of service vulnerability.

Description

The remote host is running the MDaemon IMAP server.

It is possible to crash the remote version of this software sending a long argument to the 'LOGIN' command.

This problem allows an attacker to make the remote service crash, thus preventing legitimate users from receiving emails.

Solution

There is no known solution at this time.

See Also

https://seclists.org/bugtraq/2000/Dec/352

Plugin Details

Severity: Medium

ID: 14826

File Name: mdaemon_imap_server_dos.nasl

Version: 1.21

Type: remote

Agent: windows

Family: Windows

Published: 9/27/2004

Updated: 11/15/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

Required KB Items: Settings/ParanoidReport

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 12/19/2000

Reference Information

CVE: CVE-2001-0064

BID: 2134