eMule Malformed Data Handling Remote DoS

Medium Nessus Plugin ID 11473


The remote P2P application is prone to a denial of service attack.


It was possible to disable the remote eMule client by connecting to this port and sending malformed data.


Upgrade to version 0.27c of eMule.

See Also


Plugin Details

Severity: Medium

ID: 11473

File Name: emule_dos.nasl

Version: $Revision: 1.16 $

Type: remote

Published: 2003/03/25

Modified: 2011/03/11

Risk Information

Risk Factor: Medium


Base Score: 5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND

Vulnerability Information

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 2003/03/25

Reference Information

BID: 7189

OSVDB: 14322