ID CVE-2000-0825
Summary Ipswitch Imail 6.0 allows remote attackers to cause a denial of service via a large number of connections in which a long Host: header is sent, which causes a thread to crash.
References
Vulnerable Configurations
  • Ipswitch IMail 6.00
    cpe:2.3:a:ipswitch:imail:6.00
CVSS
Base: 5.0 (as of 01-01-2004 - 00:00)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
nessus via4
NASL family Web Servers
NASL id IMAIL_HOST_OVERFLOW.NASL
description The remote web server crashes when it is issued a too long argument to the 'Host:' field of an HTTP request. An attacker may use this flaw to either completely prevent this host from serving web pages to the world, or to make it die by crashing several threads of the web server until the complete exhaustion of this host memory
last seen 2019-02-21
modified 2018-11-15
plugin id 10496
published 2000-08-24
reporter Tenable
source https://www.tenable.com/plugins/index.php?view=single&id=10496
title IMail Host: Header Field Handling Remote Overflow
refmap via4
bid 2011
bugtraq 20000817 Imail Web Service Remote DoS Attack v.2
ntbugtraq 20000817 Imail Web Service Remote DoS Attack v.2
win2ksec 20000817 Imail Web Service Remote DoS Attack v.2
xf ipswitch-imail-remote-dos(5475)
Last major update 17-10-2016 - 22:07
Published 14-11-2000 - 00:00
Last modified 09-10-2017 - 21:29
Back to Top