<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Problems with SMTP after latest Vuln Profile update? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/problems-with-smtp-after-latest-vuln-profile-update/m-p/6057#M4398</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;TABLE border="0" cellpadding="0" cellspacing="0" style="border-top-width: 1px; border-top-style: solid; border-top-color: #a4bccf;"&gt;&lt;TBODY&gt;&lt;TR id="content-232-884"&gt;&lt;TD style="font-family: Tahoma, Arial, Helvetica, sans-serif; font-size: 11px; padding-top: 3px; padding-right: 4px; padding-bottom: 3px; padding-left: 4px; border-bottom-width: 1px; border-bottom-style: solid; border-bottom-color: #a4bccf; border-right-width: 1px; border-right-style: solid; border-right-color: #a4bccf;"&gt;232-884&lt;/TD&gt;&lt;TD style="font-family: Tahoma, Arial, Helvetica, sans-serif; font-size: 11px; padding-top: 3px; padding-right: 4px; padding-bottom: 3px; padding-left: 4px; border-bottom-width: 1px; border-bottom-style: solid; border-bottom-color: #a4bccf; border-right-width: 1px; border-right-style: solid; border-right-color: #a4bccf;"&gt;Apps, Threats&lt;/TD&gt;&lt;TD style="font-family: Tahoma, Arial, Helvetica, sans-serif; font-size: 11px; padding-top: 3px; padding-right: 4px; padding-bottom: 3px; padding-left: 4px; border-bottom-width: 1px; border-bottom-style: solid; border-bottom-color: #a4bccf; border-right-width: 1px; border-right-style: solid; border-right-color: #a4bccf;"&gt;Full&lt;/TD&gt;&lt;TD style="font-family: Tahoma, Arial, Helvetica, sans-serif; font-size: 11px; padding-top: 3px; padding-right: 4px; padding-bottom: 3px; padding-left: 4px; border-bottom-width: 1px; border-bottom-style: solid; border-bottom-color: #a4bccf; border-right-width: 1px; border-right-style: solid; border-right-color: #a4bccf;"&gt;12 MB&lt;/TD&gt;&lt;TD style="font-family: Tahoma, Arial, Helvetica, sans-serif; font-size: 11px; padding-top: 3px; padding-right: 4px; padding-bottom: 3px; padding-left: 4px; border-bottom-width: 1px; border-bottom-style: solid; border-bottom-color: #a4bccf; border-right-width: 1px; border-right-style: solid; border-right-color: #a4bccf;"&gt;2011/02/15 10:46:28&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I believe I'm seeing it in relation to a recent SSL cert update I installed on my mail and anti-spam units (both of which do send outbound mail as well).&amp;nbsp; I don't know if the latest threat update is at fault; it may happen with the previous releases as well (but I don't want to roll back right now to test).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The new cert is a wildcard cert from DigiCert, and I have several subject alternative names (SANs) on it, which make the whole thing much longer than a standard cert when it is presented in an SMTP HELO/EHLO.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The vuln profile itself may not actually be at "fault" here in that it may not be the newest version causing the problem...&amp;nbsp; however, a completely legit EHLO responding to a STARTTLS request shouldn't be triggering the profile to block traffic.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 18 Feb 2011 17:04:28 GMT</pubDate>
    <dc:creator>bradenmcg</dc:creator>
    <dc:date>2011-02-18T17:04:28Z</dc:date>
    <item>
      <title>Problems with SMTP after latest Vuln Profile update?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/problems-with-smtp-after-latest-vuln-profile-update/m-p/6055#M4396</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Anyone else seeing a bunch of their SMTP connections blocked by this signature after the latest update?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE border="0" cellpadding="0" cellspacing="0" style="padding-bottom: 10px; border-bottom-width: 1px; border-bottom-style: solid; border-bottom-color: #dddddd;"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD style="padding-top: 3px; padding-right: 10px; padding-bottom: 5px; padding-left: 4px; font-family: Tahoma, Arial, Helvetica, sans-serif; font-size: 11px; background-color: #ffffff; font-weight: bold; text-align: right; vertical-align: top;" width="180"&gt;Name:&lt;/TD&gt;&lt;TD style="padding-top: 3px; padding-right: 10px; padding-bottom: 5px; padding-left: 4px; font-family: Tahoma, Arial, Helvetica, sans-serif; font-size: 11px; background-color: #ffffff; vertical-align: top;"&gt;SMTP EHLO/HELO overlong argument anomaly&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding-top: 3px; padding-right: 10px; padding-bottom: 5px; padding-left: 4px; font-family: Tahoma, Arial, Helvetica, sans-serif; font-size: 11px; background-color: #ffffff; font-weight: bold; text-align: right; vertical-align: top;" width="180"&gt;ID:&lt;/TD&gt;&lt;TD style="padding-top: 3px; padding-right: 10px; padding-bottom: 5px; padding-left: 4px; font-family: Tahoma, Arial, Helvetica, sans-serif; font-size: 11px; background-color: #ffffff; vertical-align: top;"&gt;30384&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding-top: 3px; padding-right: 10px; padding-bottom: 5px; padding-left: 4px; font-family: Tahoma, Arial, Helvetica, sans-serif; font-size: 11px; background-color: #ffffff; font-weight: bold; text-align: right; vertical-align: top;"&gt;Description:&lt;/TD&gt;&lt;TD style="padding-top: 3px; padding-right: 10px; padding-bottom: 5px; padding-left: 4px; font-family: Tahoma, Arial, Helvetica, sans-serif; font-size: 11px; background-color: #ffffff; vertical-align: top;"&gt;This anomaly would be triggered when an overlong parameter is sent to the HELOcommand of SMTP protocol. Some servers such as Tabs Laboratories MailCarrier2.51 might be prone to an overflow vulnerability while parsing the craftedrequest.A successful attack could lead to remote code execution with the privileges of the current logged-in user.&amp;nbsp; &lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't use any of the affected software so I am going to whitelist that ID, but the fact that it was just added to the system and caused me problems seemed to be something that shouldn't happen...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Feb 2011 22:55:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/problems-with-smtp-after-latest-vuln-profile-update/m-p/6055#M4396</guid>
      <dc:creator>bradenmcg</dc:creator>
      <dc:date>2011-02-17T22:55:14Z</dc:date>
    </item>
    <item>
      <title>Re: Problems with SMTP after latest Vuln Profile update?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/problems-with-smtp-after-latest-vuln-profile-update/m-p/6056#M4397</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What version are we talking about? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Feb 2011 08:17:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/problems-with-smtp-after-latest-vuln-profile-update/m-p/6056#M4397</guid>
      <dc:creator>rapoint_person</dc:creator>
      <dc:date>2011-02-18T08:17:48Z</dc:date>
    </item>
    <item>
      <title>Re: Problems with SMTP after latest Vuln Profile update?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/problems-with-smtp-after-latest-vuln-profile-update/m-p/6057#M4398</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;TABLE border="0" cellpadding="0" cellspacing="0" style="border-top-width: 1px; border-top-style: solid; border-top-color: #a4bccf;"&gt;&lt;TBODY&gt;&lt;TR id="content-232-884"&gt;&lt;TD style="font-family: Tahoma, Arial, Helvetica, sans-serif; font-size: 11px; padding-top: 3px; padding-right: 4px; padding-bottom: 3px; padding-left: 4px; border-bottom-width: 1px; border-bottom-style: solid; border-bottom-color: #a4bccf; border-right-width: 1px; border-right-style: solid; border-right-color: #a4bccf;"&gt;232-884&lt;/TD&gt;&lt;TD style="font-family: Tahoma, Arial, Helvetica, sans-serif; font-size: 11px; padding-top: 3px; padding-right: 4px; padding-bottom: 3px; padding-left: 4px; border-bottom-width: 1px; border-bottom-style: solid; border-bottom-color: #a4bccf; border-right-width: 1px; border-right-style: solid; border-right-color: #a4bccf;"&gt;Apps, Threats&lt;/TD&gt;&lt;TD style="font-family: Tahoma, Arial, Helvetica, sans-serif; font-size: 11px; padding-top: 3px; padding-right: 4px; padding-bottom: 3px; padding-left: 4px; border-bottom-width: 1px; border-bottom-style: solid; border-bottom-color: #a4bccf; border-right-width: 1px; border-right-style: solid; border-right-color: #a4bccf;"&gt;Full&lt;/TD&gt;&lt;TD style="font-family: Tahoma, Arial, Helvetica, sans-serif; font-size: 11px; padding-top: 3px; padding-right: 4px; padding-bottom: 3px; padding-left: 4px; border-bottom-width: 1px; border-bottom-style: solid; border-bottom-color: #a4bccf; border-right-width: 1px; border-right-style: solid; border-right-color: #a4bccf;"&gt;12 MB&lt;/TD&gt;&lt;TD style="font-family: Tahoma, Arial, Helvetica, sans-serif; font-size: 11px; padding-top: 3px; padding-right: 4px; padding-bottom: 3px; padding-left: 4px; border-bottom-width: 1px; border-bottom-style: solid; border-bottom-color: #a4bccf; border-right-width: 1px; border-right-style: solid; border-right-color: #a4bccf;"&gt;2011/02/15 10:46:28&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I believe I'm seeing it in relation to a recent SSL cert update I installed on my mail and anti-spam units (both of which do send outbound mail as well).&amp;nbsp; I don't know if the latest threat update is at fault; it may happen with the previous releases as well (but I don't want to roll back right now to test).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The new cert is a wildcard cert from DigiCert, and I have several subject alternative names (SANs) on it, which make the whole thing much longer than a standard cert when it is presented in an SMTP HELO/EHLO.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The vuln profile itself may not actually be at "fault" here in that it may not be the newest version causing the problem...&amp;nbsp; however, a completely legit EHLO responding to a STARTTLS request shouldn't be triggering the profile to block traffic.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Feb 2011 17:04:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/problems-with-smtp-after-latest-vuln-profile-update/m-p/6057#M4398</guid>
      <dc:creator>bradenmcg</dc:creator>
      <dc:date>2011-02-18T17:04:28Z</dc:date>
    </item>
    <item>
      <title>Re: Problems with SMTP after latest Vuln Profile update?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/problems-with-smtp-after-latest-vuln-profile-update/m-p/6058#M4399</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yep, Sounds like it should be related to your certificate. The CVE is old, so I guess this is an issue in the previous version/versions as well. I think you may need to dive in to the release notes and se what has changed if no one else here can aid. If all else fails open a case. Would like to hear how things turn out though!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Btw, Do you know for a fact that your server is subject for the threat mentioned? If not, start by exempting the threat-id until it is resolved.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Feb 2011 18:36:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/problems-with-smtp-after-latest-vuln-profile-update/m-p/6058#M4399</guid>
      <dc:creator>rapoint_person</dc:creator>
      <dc:date>2011-02-18T18:36:51Z</dc:date>
    </item>
  </channel>
</rss>

