- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
08-25-2014 11:39 AM
The description says "This signature detects an anomaly in SMTP protocol. It would trigger when anoverlong mail command argument is passed to MAIL command."
Can anyone elaborate on this definition or know where I can access more detailed information about this threat ID?
Thanks !!!!!
08-25-2014 12:47 PM
Hello Craigmueller,
This is triggered when an argument to a MAIL command to an SMTP server is overly long (304 bytes). This triggers a buffer overflow leading to a DOS and/or possible remote code execution
Regards,
Hardik Shah
08-25-2014 12:47 PM
Hello Craigmueller,
This is triggered when an argument to a MAIL command to an SMTP server is overly long (304 bytes). This triggers a buffer overflow leading to a DOS and/or possible remote code execution
Regards,
Hardik Shah
08-25-2014 12:53 PM
Hi craigmueller
This is triggered when an argument to a MAIL command to an SMTP server is overly long (304 bytes). This triggers a buffer overflow leading to a DOS and/or possible remote code execution. Bugtraq reference: http://www.securityfocus.com/bid/10290
Hope it helps !
Thanks
08-26-2014 10:27 AM
Thanks for the information.
I relayed this to my customer and haven't heard back. Hopefully it answered their questions.
08-27-2014 02:12 AM
Lot of 'SMTP Long MAIL anomaly Vulnerability' critical warnings
It generates a lot of warnings.
So we made an exeption like this.
It blocks traffic for 1 hour for the connecting ip address.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!