Vulnerability Description
mailpost.exe in MailPost 5.1.1sv, and possibly earlier versions, allows remote attackers to cause a denial of service (server crash), leak sensitive pathname information in the resulting error message, and execute a cross-site scripting (XSS) attack via an HTTP request that contains a / (backslash) and arbitrary webscript before the requested file, which leaks the pathname and does not quote the script in the resulting Visual Basic error message.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tips | Mailpost | 5.1.1_sv |
References
- http://www.kb.cert.org/vuls/id/596046Third Party AdvisoryUS Government Resource
- http://www.procheckup.com/security_info/vuln_pr0411.html
- http://www.securityfocus.com/bid/11598ExploitVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17951
- http://www.kb.cert.org/vuls/id/596046Third Party AdvisoryUS Government Resource
- http://www.procheckup.com/security_info/vuln_pr0411.html
- http://www.securityfocus.com/bid/11598ExploitVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17951
FAQ
What is CVE-2004-1101?
CVE-2004-1101 is a vulnerability with a CVSS score of 5.8 (MEDIUM). mailpost.exe in MailPost 5.1.1sv, and possibly earlier versions, allows remote attackers to cause a denial of service (server crash), leak sensitive pathname information in the resulting error message...
How severe is CVE-2004-1101?
CVE-2004-1101 has been rated MEDIUM with a CVSS base score of 5.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2004-1101?
Check the references section above for vendor advisories and patch information. Affected products include: Tips Mailpost.