ID

VAR-200106-0149


CVE

CVE-2001-0494


TITLE

Lotus Domino vulnerable to DoS via crafted HTTP header requests

Trust: 0.8

sources: CERT/CC: VU#601312

DESCRIPTION

Buffer overflow in IPSwitch IMail SMTP server 6.06 and possibly prior versions allows remote attackers to execute arbitrary code via a long From: header. The Lotus Domino Web Server contains a flaw that could be exploited to cause a denial of service. An HTTP request composed of numerous '/' sequences (approx 8k), will cause the server to consume all available system resources on the host

Trust: 2.7

sources: NVD: CVE-2001-0494 // CERT/CC: VU#601312 // CERT/CC: VU#642760 // BID: 2598 // VULHUB: VHN-3312

AFFECTED PRODUCTS

vendor:lotusmodel: - scope: - version: -

Trust: 1.6

vendor:ipswitchmodel:imailscope:lteversion:6.06

Trust: 1.0

vendor:ipswitchmodel:imailscope:eqversion:6.06

Trust: 0.6

vendor:lotusmodel:dominoscope:eqversion:5.0.6

Trust: 0.3

vendor:lotusmodel:dominoscope:eqversion:5.0.5

Trust: 0.3

vendor:lotusmodel:dominoscope:eqversion:5.0.4

Trust: 0.3

vendor:lotusmodel:dominoscope:eqversion:5.0.3

Trust: 0.3

vendor:lotusmodel:dominoscope:eqversion:5.0.2

Trust: 0.3

vendor:lotusmodel:dominoscope:eqversion:5.0.1

Trust: 0.3

vendor:lotusmodel:dominoscope:neversion:5.0.7

Trust: 0.3

sources: CERT/CC: VU#601312 // CERT/CC: VU#642760 // BID: 2598 // CNNVD: CNNVD-200106-136 // NVD: CVE-2001-0494

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2001-0494
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#601312
value: 9.98

Trust: 0.8

CARNEGIE MELLON: VU#642760
value: 10.50

Trust: 0.8

CNNVD: CNNVD-200106-136
value: HIGH

Trust: 0.6

VULHUB: VHN-3312
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2001-0494
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-3312
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#601312 // CERT/CC: VU#642760 // VULHUB: VHN-3312 // CNNVD: CNNVD-200106-136 // NVD: CVE-2001-0494

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2001-0494

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200106-136

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-200106-136

EXTERNAL IDS

db:OSVDBid:5610

Trust: 1.7

db:NVDid:CVE-2001-0494

Trust: 1.7

db:BIDid:2598

Trust: 1.1

db:XFid:6347

Trust: 0.8

db:BIDid:2565

Trust: 0.8

db:CERT/CCid:VU#601312

Trust: 0.8

db:XFid:6351

Trust: 0.8

db:CERT/CCid:VU#642760

Trust: 0.8

db:CNNVDid:CNNVD-200106-136

Trust: 0.7

db:XFid:6445

Trust: 0.6

db:BUGTRAQid:20010424 IPSWITCH IMAIL 6.06 SMTP REMOTE SYSTEM ACCESS VULNERABILITY

Trust: 0.6

db:VULHUBid:VHN-3312

Trust: 0.1

sources: CERT/CC: VU#601312 // CERT/CC: VU#642760 // VULHUB: VHN-3312 // BID: 2598 // CNNVD: CNNVD-200106-136 // NVD: CVE-2001-0494

REFERENCES

url:http://archives.neohapsis.com/archives/bugtraq/2001-04/0433.html

Trust: 1.7

url:http://ipswitch.com/support/imail/news.html

Trust: 1.7

url:http://www.osvdb.org/5610

Trust: 1.7

url:http://www.securityfocus.com/advisories/3208

Trust: 1.6

url:http://www.notes.net/r5fixlist.nsf/a8f0ffda1fc76c8985256752006aba6c?openview&start=3.111&count=30&expand=3.126#3.126

Trust: 1.6

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/6445

Trust: 1.1

url:http://www.securityfocus.com/bid/2565

Trust: 0.8

url:http://xforce.iss.net/static/6347.php

Trust: 0.8

url:http://www.securityfocus.com/bid/2598

Trust: 0.8

url:http://xforce.iss.net/static/6351.php

Trust: 0.8

url:http://xforce.iss.net/static/6445.php

Trust: 0.6

url:http://www.lotus.com/home.nsf/welcome/domino

Trust: 0.3

sources: CERT/CC: VU#601312 // CERT/CC: VU#642760 // VULHUB: VHN-3312 // BID: 2598 // CNNVD: CNNVD-200106-136 // NVD: CVE-2001-0494

CREDITS

Discovered and posted to Bugtraq by <peter.grundl@defcom.com> on April 11, 2001.

Trust: 0.3

sources: BID: 2598

SOURCES

db:CERT/CCid:VU#601312
db:CERT/CCid:VU#642760
db:VULHUBid:VHN-3312
db:BIDid:2598
db:CNNVDid:CNNVD-200106-136
db:NVDid:CVE-2001-0494

LAST UPDATE DATE

2026-02-07T20:31:32.873000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#601312date:2001-07-17T00:00:00
db:CERT/CCid:VU#642760date:2001-07-17T00:00:00
db:VULHUBid:VHN-3312date:2017-10-10T00:00:00
db:BIDid:2598date:2001-04-11T00:00:00
db:CNNVDid:CNNVD-200106-136date:2005-05-02T00:00:00
db:NVDid:CVE-2001-0494date:2025-04-03T01:03:51.193

SOURCES RELEASE DATE

db:CERT/CCid:VU#601312date:2001-07-12T00:00:00
db:CERT/CCid:VU#642760date:2001-07-12T00:00:00
db:VULHUBid:VHN-3312date:2001-06-27T00:00:00
db:BIDid:2598date:2001-04-11T00:00:00
db:CNNVDid:CNNVD-200106-136date:2001-06-27T00:00:00
db:NVDid:CVE-2001-0494date:2001-06-27T04:00:00