MDaemon POP Server User Name Overflow DoS

medium Nessus Plugin ID 14825


The remote mail server is affected by a denial of service vulnerability.


The remote host is running the MDaemon POP server.

It is possible to crash the remote service by sending a too long 'user' command.

This problem allows an attacker to make the remote MDaemon service crash, thus preventing legitimate users from receiving emails.


There is no known solution at this time.

See Also

Plugin Details

Severity: Medium

ID: 14825

File Name: mdaemon_mail_server_dos.nasl

Version: 1.24

Type: remote

Agent: windows

Family: Windows

Published: 9/27/2004

Updated: 11/15/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information


Risk Factor: Low

Score: 3.6


Risk Factor: Medium

Base Score: 5

Temporal Score: 4.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

Required KB Items: Settings/ParanoidReport

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 5/24/2000

Reference Information

CVE: CVE-2000-0399

BID: 1250