First published: Wed May 11 2005(Updated: )
DList (dlist.exe) in DMail 3.1a allows remote attackers to bypass authentication, read log files, and shutdown the system via a sendlog command with an incorrect password hash, which is not properly handled by the _cmd_sendlog function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NetWin dMail | =3.1a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-1516 has a medium severity rating due to its potential to allow unauthorized access and system shutdown.
To fix CVE-2005-1516, you should upgrade to a newer version of DMail that addresses this vulnerability.
CVE-2005-1516 exploits insufficient handling of command authentication, allowing attackers to bypass security measures.
CVE-2005-1516 affects users of DMail version 3.1a.
The consequences of CVE-2005-1516 include unauthorized access to log files and the ability to shut down the affected system.