|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Denial of Service >> MDaemon DELE DoS Vulnerability Assessment Details
|
MDaemon DELE DoS |
||
Acertains the version number of the remote POP server Detailed Explanation for this Vulnerability Assessment It is possible to crash the remote MDaemon server by suppling oversized arguments to the commands DELE and UIDL. A possible hacker may use this flaw to prevent other users from fetching their e-mail. It will also crash other MDaemon services (SMTP, IMAP), thus preventing this server from receiving any email as well. To exploit this flaw, a valid POP account is needed. *** Nessus solely relied on the version number of the remote server *** to issue this warning. Solution : upgrade to MDaemon 6.5.0 Network Security Threat Level: High Networks Security ID: 6053 Vulnerability Assessment Copyright: This script is Copyright (C) 2003 Renaud Deraison |
||
Cables, Connectors |
Vintage 250MB Digital Storage Tape Drive
$25.41
Kids & The Vic Vintage Computer Book for Commodore VIC-20
$149.00
Vintage Apple Lisa Brochure, very nice condition
$50.00
Vintage Computer Mouse - Todays Mouse - Windows 95 P S/2
$9.99
Vintage P51430TX TITANIUM I B+
$99.00
Vintage Classic Apple Macintosh System Boot Install Disk Floppy/CD *Pick Version
$10.39
Vintage Compaq 141649-004 2 Button PS/2 Gray Mouse M-S34 - FAST SHIPPING - NEW
$8.99
Z80 - NABU PC & Keyboard - Vintage New Old Stock (Retro 80's)
$139.99
RARE Vintage CVT Avant Stellar GT6OMNIKEY Mechanical Programmable Keyboard BLACK
$249.99
SEALED Vintage Western Digital Value Line Hard Drive 3.5-Inch Enhanced IDE 25 GB
$100.00
|
||
No Discussions have been posted on this vulnerability. |