sos5.0.0,
sos5.1.0
high
This protocol anomaly is an IMAP flag that is too long. This
may indicate a buffer overflow attempt.
IMAP:OVERFLOW:FLAG
sos5.0.0,
sos5.1.0
high
This signature detects buffer overflow attempts against the
IMAP package included with several Linux distributions.
Attackers may send a long string to the IMAP package to
execute code with daemon-level permissions.
IMAP:OVERFLOW:IMAP4-LSUB-OF
sos5.0.0,
sos5.1.0
high
This protocol anomaly is an IMAP line (from the client to the
server) that is too long. This may indicate a buffer overflow
attempt. NOTE: Long lines are parsed, which may generate
other IMAP overflow errors.
IMAP:OVERFLOW:LINE
sos5.1.0
high
This protocol anomaly is an IMAP literal that specifies more
octets than the user-defined maximum. A literal is a
sequence of zero or more octets. The default maximum
number of octets is 65535.
IMAP:OVERFLOW:LIT_LENGTH_OFLOW
sos5.0.0,
sos5.1.0
high
This protocol anomaly is an IMAP mailbox name that is too
long. This may indicate a buffer overflow attempt.
IMAP:OVERFLOW:MAILBOX
sos5.0.0,
sos5.1.0
high
This protocol anomaly is an IMAP user password that is too
long. This may indicate a buffer overflow attempt.
IMAP:OVERFLOW:PASS
sos5.0.0,
sos5.1.0
high
This protocol anomaly is an IMAP reference field that is too
long. This may indicate a buffer overflow attempt.
IMAP:OVERFLOW:REFERENCE
sos5.0.0,
sos5.1.0
high
This protocol anomaly is an IMAP tag field that is too long.
This may indicate a buffer overflow attempt.
IMAP:OVERFLOW:TAG
sos5.0.0,
sos5.1.0
high
This protocol anomaly is an IMAP user name that is too long.
This may indicate a buffer overflow attempt.
IMAP:OVERFLOW:USER
sos5.1.0
high
This protocol anomaly is a literal that specifies a number of
octets containing a character that is not 0 or 9.
IMAP:REQERR:INVALID_LITERAL_LEN
sos5.0.0,
sos5.1.0
medium
This protocol anomaly is an invalid IMAP tag, i.e., a tag that
begins with a white space or contains non-alphanumeric
characters. This may indicate a nonstandard IMAP client or
command line access to an IMAP server.
IMAP:REQERR:REQ-INVALID-TAG
sos5.0.0,
sos5.1.0
medium
This protocol anomaly is an IMAP command with too many
arguments. This may indicate a nonstandard IMAP client or
command line access to an IMAP server.
IMAP:REQERR:REQ-UNEXPECTED-ARG
Versions
Severity
Description
Key
sos5.1.0
critical
This protocol anomaly is a DCOM servername that is longer
than 32 octets in unicode.
MS-RPC:DCOM:SVRNAME-2LONG
sos5.1.0
low
This anomaly detects a client enumerating MSRPC endpoints
on a windows server. This may indicate a probing scan prior
to a more sophisticated attack.
MS-RPC:EPDUMP-SCAN
899
Copyright © 2010, Juniper Networks, Inc.
Appendix E: Log Entries
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.3
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Page 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Page 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Page 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Page 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Page 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Page 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Page 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Page 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Page 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Page 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Page 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Page 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Page 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Page 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Page 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Page 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Page 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...