Secunia Security Advisory - Paul Hand has discovered a vulnerability in NoticeWare Email Server, which can be exploited by malicious people to cause a DoS (Denial of Service).
1b03554ecabc3035a9915e43b3cf394411d1f731e7d97993e8d4c332cba4ee93
----------------------------------------------------------------------
Do you need accurate and reliable IDS / IPS / AV detection rules?
Get in-depth vulnerability details:
http://secunia.com/binary_analysis/sample_analysis/
----------------------------------------------------------------------
TITLE:
NoticeWare Email Server POP3 Connections Denial of Service
SECUNIA ADVISORY ID:
SA32202
VERIFY ADVISORY:
http://secunia.com/advisories/32202/
CRITICAL:
Moderately critical
IMPACT:
DoS
WHERE:
>From remote
SOFTWARE:
NoticeWare Email Server 5.x
http://secunia.com/advisories/product/20125/
DESCRIPTION:
Paul Hand has discovered a vulnerability in NoticeWare Email Server,
which can be exploited by malicious people to cause a DoS (Denial of
Service).
The vulnerability is caused due to an error when handling multiple
POP3 connections. This can be exploited to cause a crash via e.g. a
large number of POP3 connections issuing login requests.
The vulnerability is confirmed in version 5.1.2.2. Other versions may
also be affected.
SOLUTION:
Restrict network access to the POP3 service.
PROVIDED AND/OR DISCOVERED BY:
Paul Hand (rAWjAW)
ORIGINAL ADVISORY:
http://milw0rm.com/exploits/6719
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------