Vulnerability Description
Buffer overflow in DynFX MailServer version 2.10 allows remote attackers to conduct a denial of service via a long username to the POP3 service.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dynfx | Dynfx Mailserver | 2.10 |
References
- http://archives.neohapsis.com/archives/bugtraq/2001-05/0278.htmlPatchVendor Advisory
- http://www.securityfocus.com/bid/2781PatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/6615
- http://archives.neohapsis.com/archives/bugtraq/2001-05/0278.htmlPatchVendor Advisory
- http://www.securityfocus.com/bid/2781PatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/6615
FAQ
What is CVE-2001-0776?
CVE-2001-0776 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Buffer overflow in DynFX MailServer version 2.10 allows remote attackers to conduct a denial of service via a long username to the POP3 service.
How severe is CVE-2001-0776?
CVE-2001-0776 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2001-0776?
Check the references section above for vendor advisories and patch information. Affected products include: Dynfx Dynfx Mailserver.