SMTP long MAIL anomaly Vulnerability(30392)

Reply
Not applicable

SMTP long MAIL anomaly Vulnerability(30392)

The description says "This signature detects an anomaly in SMTP protocol. It would trigger when anoverlong mail command argument is passed to MAIL command."

Can anyone elaborate on this definition or know where I can access more detailed information about this threat ID?

Thanks !!!!!

L6 Presenter

Re: SMTP long MAIL anomaly Vulnerability(30392)

Hello Craigmueller,

This is triggered when an argument to a MAIL command to an SMTP server is overly long (304 bytes). This triggers a buffer overflow leading to a DOS and/or possible remote code execution

Regards,

Hardik Shah

Highlighted
bat
L5 Sessionator

Re: SMTP long MAIL anomaly Vulnerability(30392)

Hi craigmueller

This is triggered when an argument to a MAIL command to an SMTP server is overly long (304 bytes). This triggers a buffer overflow leading to a DOS and/or possible remote code execution. Bugtraq reference: http://www.securityfocus.com/bid/10290


Hope it helps !


Thanks

Not applicable

Re: SMTP long MAIL anomaly Vulnerability(30392)

Thanks for the information.

I relayed this to my customer and haven't heard back. Hopefully it answered their questions.

RIF
L1 Bithead

Re: SMTP long MAIL anomaly Vulnerability(30392)

Lot of 'SMTP Long MAIL anomaly Vulnerability' critical warnings

It generates a lot of warnings.

So we made an exeption like this.

It blocks traffic for 1 hour for the connecting ip address.

Capture.JPG

Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the Live Community as a whole!

The Live Community thanks you for your participation!