sos5.0.0,
sos5.1.0
medium
This signature detects attempts to exploit a vulnerability in
the Microsoft SMTP Service in Microsoft IIS. Versions 4.0
and 5.0 are vulnerable. A maliciously crafted 'rcpt to:'
command can circumvent e-mail relaying rules. Attackers
may impersonate trusted e-mails or send spam
anonymously.
SMTP:IIS:IIS-ENCAPS-RELAY
sos5.1.0
medium
This protocol anomaly is an SMTP boundary depth that
exceeds the user-defined maximum. The boundary depth
indicates the number of nested attachments in a MIME
multipart message. The default boundary depth is 4.
SMTP:INVALID:2MANY-BOUNDARY
sos5.1.0
high
This protocol anomaly is an SMTP message with base64
encoding that contains an invalid character.
SMTP:INVALID:BASE64-CHAR
sos5.1.0
medium
This protocol anomaly is an SMTP message with a
content-type multipart that has no boundary parameter.
The boundary parameter specifies a text string that is used
to delimit the parts of the multipart message.
SMTP:INVALID:BOUNDARY-MISS
sos5.1.0
medium
This protocol anomaly is multiple AUTH commands within
a single SMTP transaction.
SMTP:INVALID:DUP_AUTH
sos5.1.0
high
This protocol anomaly is an SMTP message with a MIME
multipart content-type that uses duplicate boundaries.
SMTP:INVALID:DUP-BOUNDARY
sos5.1.0
high
This protocol anomaly is an SMTP message with a MIME
multipart boundary that exceeds actual multipart data (all
data is processed but unfinished boundary delimiters exist).
SMTP:INVALID:UNFIN-MULTIPART
sos5.0.0,
sos5.1.0
high
This signature detects attempts to send shell commands
via an SMTP e-mail message by exploiting the back-tick (`)
vulnerability in Great Circle Associates Majordomo, a
perl-based Internet e-mail list server. When processing a list
command, Majordomo compares the "reply to" e-mail
address again the advertise/noadvertise lists (if configured).
During this comparison, Majordomo may be tricked into
executing commands when it expands the back-tick operator
(used by UNIX to enclose executable commands in a shell
command line). Attackers may use the back-tick operator
in the "reply to" e-mail header to execute arbitrary
commands on the server.
SMTP:MAJORDOMO:COMMAND-EXEC
sos5.1.0
high
This signature detects a maliciously crafted PDF file attached
to an e-mail. Attackers may insert certain shell
metacharacters at the beginning of a uuencoded PDF file to
force Adobe Acrobat to execute arbitrary commands upon
loading the file.
SMTP:MAL:ACROBAT-UUEXEC
sos5.1.0
high
This signature detects attempts to exploit a vulnerability in
Microsoft Outlook Express. Attackers may embed binary
control characters in a URL that is included in an e-mail;
when the URL is viewed, these control characters prevent
Outlook Express and Internet Explorer from displaying the
complete URL, which may have malicious content.
SMTP:MAL:EMAIL-URL-HIDING-ENC
Copyright © 2010, Juniper Networks, Inc.
924
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...