IMail Host: Header Field Handling Remote Overflow

medium Nessus Plugin ID 10496

Synopsis

The remote web server is affected by a denial of service vulnerability.

Description

The remote web server crashes when it is issued a too long argument to the 'Host:' field of an HTTP request.

An attacker may use this flaw to either completely prevent this host from serving web pages to the world, or to make it die by crashing several threads of the web server until the complete exhaustion of this host memory

Solution

Upgrade to IMail 6.0.4 or later, as this reportedly fixes the issue.

See Also

https://marc.info/?l=bugtraq&m=96659012127444&w=2

Plugin Details

Severity: Medium

ID: 10496

File Name: imail_host_overflow.nasl

Version: 1.30

Type: remote

Family: Web Servers

Published: 8/24/2000

Updated: 11/15/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

Required KB Items: Settings/ParanoidReport

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 8/17/2000

Reference Information

CVE: CVE-2000-0825

BID: 2011