MDaemon POP Server User Name Overflow DoS

medium Nessus Plugin ID 14825

Synopsis

The remote mail server is affected by a denial of service vulnerability.

Description

The remote host is running the MDaemon POP server.

It is possible to crash the remote service by sending a too long 'user' command.

This problem allows an attacker to make the remote MDaemon service crash, thus preventing legitimate users from receiving emails.

Solution

There is no known solution at this time.

See Also

https://seclists.org/bugtraq/2000/May/306

Plugin Details

Severity: Medium

ID: 14825

File Name: mdaemon_mail_server_dos.nasl

Version: 1.24

Type: remote

Agent: windows

Family: Windows

Published: 9/27/2004

Updated: 11/15/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

Required KB Items: Settings/ParanoidReport

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 5/24/2000

Reference Information

CVE: CVE-2000-0399

BID: 1250