<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Action on a vulnerabilty found in a SMTP flow in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/action-on-a-vulnerabilty-found-in-a-smtp-flow/m-p/403560#M91826</link>
    <description>&lt;P&gt;I've just come across this very issue.&amp;nbsp; Kind of a pain.&amp;nbsp; Any update on the feature request?&lt;/P&gt;</description>
    <pubDate>Wed, 28 Apr 2021 18:45:59 GMT</pubDate>
    <dc:creator>GMTPaul</dc:creator>
    <dc:date>2021-04-28T18:45:59Z</dc:date>
    <item>
      <title>Action on a vulnerabilty found in a SMTP flow</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/action-on-a-vulnerabilty-found-in-a-smtp-flow/m-p/138292#M47927</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How to configure the PA firewall to return a SMTP 541 when vulnerability is seen in a SMTP flow ? I have managed to do it with the AV protection but not with the vulnerability protection.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cedric&lt;/P&gt;</description>
      <pubDate>Thu, 19 Jan 2017 08:18:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/action-on-a-vulnerabilty-found-in-a-smtp-flow/m-p/138292#M47927</guid>
      <dc:creator>Cedricd</dc:creator>
      <dc:date>2017-01-19T08:18:28Z</dc:date>
    </item>
    <item>
      <title>Re: Action on a vulnerabilty found in a SMTP flow</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/action-on-a-vulnerabilty-found-in-a-smtp-flow/m-p/138307#M47928</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/42958"&gt;@Cedricd&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This should help you out :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Featured-Articles/Tips-amp-Tricks-Complete-Action-List-in-Profiles/ta-p/129296" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Featured-Articles/Tips-amp-Tricks-Complete-Action-List-in-Profiles/ta-p/129296&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cheers !&lt;/P&gt;
&lt;P&gt;-Kim.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Jan 2017 08:53:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/action-on-a-vulnerabilty-found-in-a-smtp-flow/m-p/138307#M47928</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2017-01-19T08:53:58Z</dc:date>
    </item>
    <item>
      <title>Re: Action on a vulnerabilty found in a SMTP flow</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/action-on-a-vulnerabilty-found-in-a-smtp-flow/m-p/138309#M47929</link>
      <description>&lt;P&gt;Thanks &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/11943"&gt;@kiwi&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From what I see, starting from 7.0, I will be able to use 'reset both' for vulnerabilty and if it is SMTP, it will send a SMTP 541 ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Currently, I am using 6.1 and it is only working like that for AV protection.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Jan 2017 09:16:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/action-on-a-vulnerabilty-found-in-a-smtp-flow/m-p/138309#M47929</guid>
      <dc:creator>Cedricd</dc:creator>
      <dc:date>2017-01-19T09:16:13Z</dc:date>
    </item>
    <item>
      <title>Re: Action on a vulnerabilty found in a SMTP flow</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/action-on-a-vulnerabilty-found-in-a-smtp-flow/m-p/138310#M47930</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/42958"&gt;@Cedricd&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Yes, that is correct.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cheers !&lt;/P&gt;
&lt;P&gt;-Kim.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Jan 2017 09:21:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/action-on-a-vulnerabilty-found-in-a-smtp-flow/m-p/138310#M47930</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2017-01-19T09:21:10Z</dc:date>
    </item>
    <item>
      <title>Re: Action on a vulnerabilty found in a SMTP flow</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/action-on-a-vulnerabilty-found-in-a-smtp-flow/m-p/138564#M47987</link>
      <description>&lt;P&gt;Hi kiwi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;is it possible that this does not work if there is a vulnerability found inside an attachment?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For example I have emails arriving with office documents where a threat (Microsoft Office Memory Corruption Vulnerability (id 38859)) is found inside the office document and the corresponding email gateway does not receive a smtp error 541 but gets the connection cancelled via tcp reset and retries and retries to deliver the email to the backend server. The email gateway itself states smtp error&amp;nbsp;&lt;SPAN&gt;442 Bad Connection.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;We are on PAN-OS 7.1 so according to the&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/Featured-Articles/Tips-amp-Tricks-Complete-Action-List-in-Profiles/ta-p/129296" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Featured-Articles/Tips-amp-Tricks-Complete-Action-List-in-Profiles/ta-p/129296&lt;/A&gt; the firewall should send smtp error 541&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Best regards&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Alex&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Jan 2017 14:48:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/action-on-a-vulnerabilty-found-in-a-smtp-flow/m-p/138564#M47987</guid>
      <dc:creator>aroos_dts</dc:creator>
      <dc:date>2017-01-20T14:48:50Z</dc:date>
    </item>
    <item>
      <title>Re: Action on a vulnerabilty found in a SMTP flow</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/action-on-a-vulnerabilty-found-in-a-smtp-flow/m-p/138784#M48023</link>
      <description>&lt;P&gt;That's exactly my problem with PAN-OS 6.1. I was hoping 7.1 solved that issue but it looks like it is not the case ?&lt;/P&gt;</description>
      <pubDate>Mon, 23 Jan 2017 08:47:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/action-on-a-vulnerabilty-found-in-a-smtp-flow/m-p/138784#M48023</guid>
      <dc:creator>Cedricd</dc:creator>
      <dc:date>2017-01-23T08:47:38Z</dc:date>
    </item>
    <item>
      <title>Re: Action on a vulnerabilty found in a SMTP flow</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/action-on-a-vulnerabilty-found-in-a-smtp-flow/m-p/138846#M48039</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/15661"&gt;@aroos_dts&lt;/a&gt;&amp;nbsp;,&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/42958"&gt;@Cedricd&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I might have mixed up virus/vulnerability in my previous comment &lt;span class="lia-unicode-emoji" title=":confused_face:"&gt;😕&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It actually&amp;nbsp;depends if the&amp;nbsp;email is identified as virus or as vulnerability.&lt;/P&gt;
&lt;P&gt;Note that in Antivirus profile you have an SMTP decoder (you don't have this decoder in Vulnerability profiles). &amp;nbsp;&lt;/P&gt;
&lt;P&gt;The article posted earlier does mention that it only applies to the SMTP decoder.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;With the correct action of "reset-both" in the SMTP decoder you will get the 541 response.&lt;/P&gt;
&lt;P&gt;However, in the vulnerability profile, there is no such thing as an SMTP decoder so you will get a TCP reset.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The good news is that there is already a feature request to add this functionality to Vulnerability profiles (FR #&lt;SPAN&gt;6548&lt;/SPAN&gt;).&amp;nbsp; &amp;nbsp;You can reach out to your local SE and ask him to add your vote to this feature.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind regards,&lt;/P&gt;
&lt;P&gt;-Kim.&lt;/P&gt;</description>
      <pubDate>Mon, 23 Jan 2017 13:49:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/action-on-a-vulnerabilty-found-in-a-smtp-flow/m-p/138846#M48039</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2017-01-23T13:49:29Z</dc:date>
    </item>
    <item>
      <title>Re: Action on a vulnerabilty found in a SMTP flow</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/action-on-a-vulnerabilty-found-in-a-smtp-flow/m-p/138863#M48040</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/11943"&gt;@kiwi&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks for your fast response! So we hope that this will be implemented some day &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;Alex&lt;/P&gt;</description>
      <pubDate>Mon, 23 Jan 2017 14:45:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/action-on-a-vulnerabilty-found-in-a-smtp-flow/m-p/138863#M48040</guid>
      <dc:creator>aroos_dts</dc:creator>
      <dc:date>2017-01-23T14:45:16Z</dc:date>
    </item>
    <item>
      <title>Re: Action on a vulnerabilty found in a SMTP flow</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/action-on-a-vulnerabilty-found-in-a-smtp-flow/m-p/403560#M91826</link>
      <description>&lt;P&gt;I've just come across this very issue.&amp;nbsp; Kind of a pain.&amp;nbsp; Any update on the feature request?&lt;/P&gt;</description>
      <pubDate>Wed, 28 Apr 2021 18:45:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/action-on-a-vulnerabilty-found-in-a-smtp-flow/m-p/403560#M91826</guid>
      <dc:creator>GMTPaul</dc:creator>
      <dc:date>2021-04-28T18:45:59Z</dc:date>
    </item>
  </channel>
</rss>

