Current Description

Multiple buffer overflows in Thomas Hauck Jana Server 2.x through 2.2.1, and 1.4.6 and earlier, allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) an HTTP GET request with a long major version number, (2) an HTTP GET request to the HTTP proxy on port 3128 with a long major version number, (3) a long OK reply from a POP3 server, and (4) a long SMTP server response.

Basic Data

PublishedOctober 04, 2002
Last ModifiedSeptember 05, 2008
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score7.5
Exploitability Score10.0
Impact Score6.4
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegetrue

Base Metric V3

No data provided.


  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationT. HauckJana Web Server1.0*******
    2.3ApplicationT. HauckJana Web Server1.45*******
    2.3ApplicationT. HauckJana Web Server1.46*******
    2.3ApplicationT. HauckJana Web Server2.0*******
    2.3ApplicationT. HauckJana Web Server2.0_beta1*******
    2.3ApplicationT. HauckJana Web Server2.0_beta2*******
    2.3ApplicationT. HauckJana Web Server2.2.1*******

Vulnerable Software List

T. Hauck Jana Web Server 1.0, 1.45, 1.46, 2.0, 2.0_beta1, 2.0_beta2, 2.2.1


20020726 SECURITY.NNOV: multiple vulnerabilities in JanaServer
jana-pop3-logging-bo(9685) Advisory
jana-smtp-logging-bo(9686) Advisory
5320 Vendor Advisory
5322 Advisory