<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SMTP long MAIL anomaly Vulnerability(30392) in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/smtp-long-mail-anomaly-vulnerability-30392/m-p/2331#M1722</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/thread/10696"&gt;Lot of 'SMTP Long MAIL anomaly Vulnerability' critical warnings&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It generates a lot of warnings.&lt;/P&gt;&lt;P&gt;So we made an exeption like this.&lt;/P&gt;&lt;P&gt;It blocks traffic for 1 hour for the connecting ip address.&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="15147" alt="Capture.JPG" class="image-1 jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/15147_Capture.JPG" style="width: 620px; height: 281px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 27 Aug 2014 09:12:54 GMT</pubDate>
    <dc:creator>RIF</dc:creator>
    <dc:date>2014-08-27T09:12:54Z</dc:date>
    <item>
      <title>SMTP long MAIL anomaly Vulnerability(30392)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/smtp-long-mail-anomaly-vulnerability-30392/m-p/2327#M1718</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The description says "This signature detects an anomaly in SMTP protocol. It would trigger when anoverlong mail command argument is passed to MAIL command."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anyone elaborate on this definition or know where I can access more detailed information about this threat ID?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks !!!!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Aug 2014 18:39:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/smtp-long-mail-anomaly-vulnerability-30392/m-p/2327#M1718</guid>
      <dc:creator>craigmueller</dc:creator>
      <dc:date>2014-08-25T18:39:11Z</dc:date>
    </item>
    <item>
      <title>Re: SMTP long MAIL anomaly Vulnerability(30392)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/smtp-long-mail-anomaly-vulnerability-30392/m-p/2328#M1719</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Craigmueller,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is triggered when an argument to a MAIL command to an SMTP server is overly long (304 bytes). This triggers a buffer overflow leading to a DOS and/or possible remote code execution&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hardik Shah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Aug 2014 19:47:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/smtp-long-mail-anomaly-vulnerability-30392/m-p/2328#M1719</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2014-08-25T19:47:35Z</dc:date>
    </item>
    <item>
      <title>Re: SMTP long MAIL anomaly Vulnerability(30392)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/smtp-long-mail-anomaly-vulnerability-30392/m-p/2329#M1720</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;A href="https://live.paloaltonetworks.com/u1/28351"&gt;craigmueller&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px;"&gt;&lt;SPAN&gt;This is triggered when an argument to a MAIL command to an SMTP server is overly long (304 bytes). This triggers a buffer overflow leading to a DOS and/or possible remote code execution. Bugtraq reference: &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.securityfocus.com/bid/10290" rel="nofollow"&gt;http://www.securityfocus.com/bid/10290&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px;"&gt;Hope it helps !&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px;"&gt;Thanks&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Aug 2014 19:53:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/smtp-long-mail-anomaly-vulnerability-30392/m-p/2329#M1720</guid>
      <dc:creator>bat</dc:creator>
      <dc:date>2014-08-25T19:53:28Z</dc:date>
    </item>
    <item>
      <title>Re: SMTP long MAIL anomaly Vulnerability(30392)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/smtp-long-mail-anomaly-vulnerability-30392/m-p/2330#M1721</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the information.&lt;/P&gt;&lt;P&gt;I relayed this to my customer and haven't heard back. Hopefully it answered their questions.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Aug 2014 17:27:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/smtp-long-mail-anomaly-vulnerability-30392/m-p/2330#M1721</guid>
      <dc:creator>craigmueller</dc:creator>
      <dc:date>2014-08-26T17:27:03Z</dc:date>
    </item>
    <item>
      <title>Re: SMTP long MAIL anomaly Vulnerability(30392)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/smtp-long-mail-anomaly-vulnerability-30392/m-p/2331#M1722</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/thread/10696"&gt;Lot of 'SMTP Long MAIL anomaly Vulnerability' critical warnings&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It generates a lot of warnings.&lt;/P&gt;&lt;P&gt;So we made an exeption like this.&lt;/P&gt;&lt;P&gt;It blocks traffic for 1 hour for the connecting ip address.&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="15147" alt="Capture.JPG" class="image-1 jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/15147_Capture.JPG" style="width: 620px; height: 281px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Aug 2014 09:12:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/smtp-long-mail-anomaly-vulnerability-30392/m-p/2331#M1722</guid>
      <dc:creator>RIF</dc:creator>
      <dc:date>2014-08-27T09:12:54Z</dc:date>
    </item>
  </channel>
</rss>

