Vulnerability Description
Ipswitch Imail 6.0 allows remote attackers to cause a denial of service via a large number of connections in which a long Host: header is sent, which causes a thread to crash.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ipswitch | Imail | 6.00 |
References
- http://archives.neohapsis.com/archives/win2ksecadvice/2000-q3/0071.htmlExploitVendor Advisory
- http://marc.info/?l=bugtraq&m=96659012127444&w=2
- http://marc.info/?l=ntbugtraq&m=96654521004571&w=2
- http://www.securityfocus.com/bid/2011
- https://exchange.xforce.ibmcloud.com/vulnerabilities/5475
- http://archives.neohapsis.com/archives/win2ksecadvice/2000-q3/0071.htmlExploitVendor Advisory
- http://marc.info/?l=bugtraq&m=96659012127444&w=2
- http://marc.info/?l=ntbugtraq&m=96654521004571&w=2
- http://www.securityfocus.com/bid/2011
- https://exchange.xforce.ibmcloud.com/vulnerabilities/5475
FAQ
What is CVE-2000-0825?
CVE-2000-0825 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Ipswitch Imail 6.0 allows remote attackers to cause a denial of service via a large number of connections in which a long Host: header is sent, which causes a thread to crash.
How severe is CVE-2000-0825?
CVE-2000-0825 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2000-0825?
Check the references section above for vendor advisories and patch information. Affected products include: Ipswitch Imail.