Apache James < 2.2.1 Spooler retrieve Function DoS

medium Nessus Network Monitor Plugin ID 3320

Synopsis

The remote host is vulnerable to a Denial of Service (DoS) attack.

Description

The remote host is running the Apache James software, a Java-based POP3, SMTP, and NNTP server. This version of JAMES is vulnerable to a flaw in the way that the spooler handles malformed messages. An attacker exploiting this flaw would need to be able to send multiple malformed emails to the server. Successful exploitation would result in the JAMES server depleting all system resources and eventually crashing.

Solution

Upgrade to version 2.2.1 or higher.

See Also

http://james.apache.org/index.html

Plugin Details

Severity: Medium

ID: 3320

Family: POP Server

Published: 12/8/2005

Updated: 3/6/2019

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 4.9

Temporal Score: 4.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C

CVSS v3

Risk Factor: Medium

Base Score: 6.2

Temporal Score: 5.7

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:U/RC:C

Vulnerability Information

CPE: cpe:/a:apache:james

Reference Information

CVE: CVE-2004-2650

BID: 15765