Multiple Vulnerabilities Exist in Kerio MailServer 5.0 for Windows XP/2000/NT

Reported August 19, 2002, by Abraham Lincoln Hao.


·         Kerio MailServer 5.0 for Windows XP/2000/NT


Multiple vulnerabilities exist in Kerio MailServer 5.0 for Windows that could result in a Denial of Service (DoS) or cross-site scripting scenario. Sending at least five SYN packets to any of a mail server's services (i.e., POP3, SMTP, IMAP, Secure IMAP, POP3S, Web-mail, and secure Web-mail services) can result in that service not responding; however, the service will be available again after several minutes. An attack that exploits this vulnerability consumes all system resources. Several URLs provided in the Web-mail function allow cross-site scripting, which could let any user who has Web-mail access execute malicious scripts. The following URLs are vulnerable:

·         http://localhost//login

·         http://localhost//search

·         http://localhost//settings

·         http://localhost//new

·         http://localhost//list

·         http://localhost//logout


The vendor, Kerio Technologies, has been notified but has not yet released a patch for these vulnerabilities.

Discovered by Abraham Lincoln Hao of NSSI Research Labs.

Hide comments


  • Allowed HTML tags: <em> <strong> <blockquote> <br> <p>

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.