Apache James < 2.2.1 Spooler retrieve Function DoS

Medium Nessus Network Monitor Plugin ID 3320


The remote host is vulnerable to a Denial of Service (DoS) attack.


The remote host is running the Apache James software, a Java-based POP3, SMTP, and NNTP server. This version of JAMES is vulnerable to a flaw in the way that the spooler handles malformed messages. An attacker exploiting this flaw would need to be able to send multiple malformed emails to the server. Successful exploitation would result in the JAMES server depleting all system resources and eventually crashing.


Upgrade to version 2.2.1 or higher.

See Also


Plugin Details

Severity: Medium

ID: 3320

Family: POP Server

Published: 2005/12/08

Updated: 2019/03/06

Dependencies: 3035

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 4.9

Temporal Score: 4.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C

Temporal Vector: CVSS2#E:U/RL:U/RC:C

CVSS v3.0

Base Score: 6.1

Temporal Score: 5.6

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:U/RC:C

Vulnerability Information

CPE: cpe:/a:apache:james

Reference Information

CVE: CVE-2004-2650

BID: 15765