![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.10496 |
Category: | Denial of Service |
Title: | Imail Host: overflow |
Summary: | NOSUMMARY |
Description: | Description: The remote web server crashes when it is issued a too long argument to the 'Host:' field of an HTTP request. An attacker may use this flaw to either completely prevent this host from serving web pages to the world, or to make it die by crashing several threads of the web server until the complete exhaustion of this host memory Risk factor : High Solution : Upgrade your web server. |
Cross-Ref: |
BugTraq ID: 2011 Common Vulnerability Exposure (CVE) ID: CVE-2000-0825 http://www.securityfocus.com/bid/2011 Bugtraq: 20000817 Imail Web Service Remote DoS Attack v.2 (Google Search) http://marc.info/?l=bugtraq&m=96659012127444&w=2 http://marc.info/?l=ntbugtraq&m=96654521004571&w=2 http://archives.neohapsis.com/archives/win2ksecadvice/2000-q3/0071.html XForce ISS Database: ipswitch-imail-remote-dos(5475) https://exchange.xforce.ibmcloud.com/vulnerabilities/5475 |
Copyright | This script is Copyright (C) 2000 Renaud Deraison |
This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |