Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Denial of Service >> Kerio MailServer < 6.0.10


Vulnerability Assessment Details

Kerio MailServer < 6.0.10

Vulnerability Assessment Summary
Checks for Kerio MailServer < 6.0.10

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote mail server is vulnerable to multiple denial of service
attacks.

Description :

According to its banner, the remote host is running a version of Kerio
MailServer prior to 6.0.10. In those versions, crashes can occur when
downloading certain email messages in IMAP or Outlook with Kerio
Outlook Connector (KOC) or, under Linux, when parsing email messages
with multiple embedded 'eml' attachments.

See also :

http://www.kerio.com/kms_history.html

Solution :

Upgrade to Kerio MailServer 6.0.10 or newer.

Network Security Threat Level:

Low / CVSS Base Score : 1
(AV:R/AC:L/Au:R/C:N/A:P/I:N/B:N)

Networks Security ID: 13616

Vulnerability Assessment Copyright: This script is Copyright (C) 2005-2006 Tenable Network Security

Cables, Connectors

3.5in Silicone Hard Drive Protector Sleeve with Connector Cap (LOT of 31 pcs)
$0.74
3.5in Silicone Hard Drive Protector Sleeve with Connector Cap (LOT of 31 pcs) pictureSAMSUNG 850 EVO M.2 2280 1TB SATA III INTERNAL SOLID STATE DRIVE MZ-N5E1T0BW NIB
$225.0
SAMSUNG 850 EVO M.2 2280 1TB SATA III INTERNAL SOLID STATE DRIVE MZ-N5E1T0BW NIB pictureORICO USB 3.0 2.5" Inch SATA HD Hard Drive Disk HDD External Enclosure - Silver
$0.99
ORICO USB 3.0 2.5Toshiba 500GB 2.5" SATA III HDD 7200RPM hard drive; MQ01ACF050
$0.99
Toshiba 500GB 2.5


Discussions

No Discussions have been posted on this vulnerability.