First published: Mon Apr 07 2008(Updated: )
Stack consumption vulnerability in WebContainer.exe 1.0.0.336 and earlier in SLMail Pro 6.3.1.0 and earlier allows remote attackers to cause a denial of service (daemon crash) via a long request header in an HTTP request to TCP port 801. NOTE: some of these details are obtained from third party information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Slmail | <=6.3.1.0 | |
Slmail | =5.5 | |
Slmail | =6.1 | |
Slmail | =6.2 | |
Slmail | =6.2.1 | |
Slmail | =6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1689 is classified as a denial of service vulnerability, which can crash the SLMail Pro daemon.
To mitigate CVE-2008-1689, upgrade SLMail Pro to version 6.3.2 or later, which addresses this vulnerability.
CVE-2008-1689 affects SLMail Pro versions up to and including 6.3.1.0.
CVE-2008-1689 is caused by stack consumption due to overly long request headers in HTTP requests sent to TCP port 801.
Yes, CVE-2008-1689 can be exploited remotely by sending crafted HTTP requests to the affected SLMail Pro server.