Apache James < 2.2.1 Spooler retrieve Function DoS

Medium Nessus Network Monitor Plugin ID 3320

Synopsis

The remote host is vulnerable to a Denial of Service (DoS) attack.

Description

The remote host is running the Apache James software, a Java-based POP3, SMTP, and NNTP server. This version of JAMES is vulnerable to a flaw in the way that the spooler handles malformed messages. An attacker exploiting this flaw would need to be able to send multiple malformed emails to the server. Successful exploitation would result in the JAMES server depleting all system resources and eventually crashing.

Solution

Upgrade to version 2.2.1 or higher.

See Also

http://james.apache.org/index.html

Plugin Details

Severity: Medium

ID: 3320

Family: POP Server

Published: 2005/12/08

Modified: 2018/07/11

Dependencies: 3035

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 4.9

Temporal Score: 4.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C

Temporal Vector: CVSS2#E:U/RL:U/RC:C

CVSSv3

Base Score: 6.1

Temporal Score: 5.6

Vector: CVSS3#AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS3#E:U/RL:U/RC:C

Vulnerability Information

CPE: cpe:/a:apache:james

Reference Information

CVE: CVE-2004-2650

BID: 15765