Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Denial of Service >> Kerio MailServer < 6.0.10


Vulnerability Assessment Details

Kerio MailServer < 6.0.10

Vulnerability Assessment Summary
Checks for Kerio MailServer < 6.0.10

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote mail server is vulnerable to multiple denial of service
attacks.

Description :

According to its banner, the remote host is running a version of Kerio
MailServer prior to 6.0.10. In those versions, crashes can occur when
downloading certain email messages in IMAP or Outlook with Kerio
Outlook Connector (KOC) or, under Linux, when parsing email messages
with multiple embedded 'eml' attachments.

See also :

http://www.kerio.com/kms_history.html

Solution :

Upgrade to Kerio MailServer 6.0.10 or newer.

Network Security Threat Level:

Low / CVSS Base Score : 1
(AV:R/AC:L/Au:R/C:N/A:P/I:N/B:N)

Networks Security ID: 13616

Vulnerability Assessment Copyright: This script is Copyright (C) 2005-2006 Tenable Network Security

Cables, Connectors

Symantec Backup Exec Remote Agent (CAL) Linux or UNIX Servers Build 5629 CD
$4.99
Symantec Backup Exec Remote Agent (CAL) Linux or UNIX Servers Build 5629 CD pictureSymantec Backup Exec Remote Agent Linux UNIX, MAC, Windows NT4 Server Build 7170
$4.99
Symantec Backup Exec Remote Agent Linux UNIX, MAC, Windows NT4 Server Build 7170 pictureUBUNTU SERVER 16.04 LTS LINUX - INSTALL CDs - 32BIT - 2017
$2.95
UBUNTU SERVER 16.04 LTS LINUX - INSTALL CDs - 32BIT - 2017 pictureMicrosoft BackOffice Small Business Server 4.5 (5-client)
$80.0
Microsoft BackOffice Small Business Server 4.5 (5-client) picture


Discussions

No Discussions have been posted on this vulnerability.