First published: Sat Aug 31 2002(Updated: )
IPSwitch IMail Web Calendaring service (iwebcal) allows remote attackers to cause a denial of service (crash) via an HTTP POST request without a Content-Length field.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
IPSWITCH IMail | =6.4 | |
IPSWITCH IMail | =7.0.5 | |
IPSWITCH IMail | =7.0.2 | |
IPSWITCH IMail | =7.0.1 | |
IPSWITCH IMail | =7.1 | |
IPSWITCH IMail | =7.0.7 | |
IPSWITCH IMail | =7.0.6 | |
IPSWITCH IMail | =6.1 | |
IPSWITCH IMail | =6.3 | |
IPSWITCH IMail | =7.0.4 | |
IPSWITCH IMail | =6.2 | |
IPSWITCH IMail | =7.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1077 has been classified as a denial of service vulnerability.
To mitigate CVE-2002-1077, ensure that your IPSwitch IMail software is updated to a patched version.
CVE-2002-1077 affects IPSwitch IMail versions 6.1, 6.2, 6.3, 6.4, and 7.0.1 through 7.1 along with 7.0.2 to 7.0.7.
CVE-2002-1077 allows remote attackers to cause the application to crash by sending a specific HTTP POST request.
CVE-2002-1077 is a legacy vulnerability and is primarily a risk for systems still running unsupported versions of IPSwitch IMail.