Multiple DoS attack vulnerabilities in MDaemon Server
----------------------------------------------------------------------------
----


SUMMARY

UssrLabs recently found multiple places in the  <http://www.mdaemon.com/> 
MDaemon Server where buffer bounds aren't checked correctly. This results 
in a possible Denial of Service attack against the service in question.

DETAILS

Vulnerable systems:
MDaemon Server v2.8.5.0

By connecting to MDaemon's services (WorldClient - port 2000) or WebConfig 
(port 2002) a remote attacker can cause the MDaemon Server to crash - 
effectively causing a Denial of Service attack.

These two remote services can be subjected to a buffer overflow when 
sending a large URL.

Example:

http:/serverip/aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa

Binary version of the remote DoS can be downloaded from:
 <http://www.ussrback.com/mdeam285/Mdeam285.exe> 
http://www.ussrback.com/mdeam285/Mdeam285.exe

Source code version of the remote DoS can be downloaded from:
 <http://www.ussrback.com/mdeam285/Mdeam285.zip> 
http://www.ussrback.com/mdeam285/Mdeam285.zip



[yanglagikeselsamamdaemon]
[abisnyabouncemessagedibalikinkesendersihbukannyakereturn-pathnya]
-------
AFLHI 058009990407128029/089802---(102598//991024)


 http://www.indolinux.com - Nikmati Layanan Personal INDOLINUX :: 
 http://techscape.net/ - Webhosting: Dual T3 on Dual Pentium III 450Mhz
 Only US$1.95/month -> CGI SSL 5MB Unlimited Traffic & Mail FP2000
 -------------------------------------------------------------------
 untuk berhenti kirim  email  ke  [EMAIL PROTECTED]
 untuk melihat peraturan kirim email  ke  [EMAIL PROTECTED]
 arsip berada di  http://www.mail-archive.com/[email protected]
 

Kirim email ke