sos5.1.0
high
This protocol anomaly is an SMTP content-disposition
filename that exceeds the user-defined maximum. The
default number of bytes in a content-disposition filename
is 128.
SMTP:OVERFLOW:FILENAME
sos5.1.0
high
This signature detects SMTP messages with headers that
contain format string errors. Metamail 2.7 and earlier versions
are vulnerable. Because Metamail does not handle SMTP
headers correctly, attackers may send maliciously crafted
SMTP messages to execute arbitrary code at the same
privilege level as the target (typically user). Note: Systems
that typically carry non-English e-mail messages should not
include this attack object in their security policy.
SMTP:OVERFLOW:METAMAIL-HDR-FS2
sos5.1.0
high
This signature detects SMTP messages with large headers
that contain character set information. Metamail 2.7 and
earlier versions are vulnerable. Because Metamail does not
handle SMTP headers correctly, attackers may send
maliciously crafted SMTP messages to execute arbitrary
code at the same privilege level as the target (typically a
user). Note: Systems that typically carry non-English e-mail
messages should not include this attack object in their
security policy.
SMTP:OVERFLOW:METAMAIL-HDR-OF1
sos5.1.0
high
This signature detects SMTP messages with large headers
that contain character set information. Metamail 2.7 and
earlier versions are vulnerable. Because Metamail does not
handle SMTP headers correctly, attackers may send
maliciously crafted SMTP messages to execute arbitrary
code at the same privilege level as the target (typically a
user). Note: Systems that typically carry non-English e-mail
messages should not include this attack object in their
security policy.
SMTP:OVERFLOW:METAMAIL-HDR-OF2
sos5.0.0,
sos5.1.0
high
This signature detects buffer overflow attempts against
Microsoft Outlook Express, which ships with Internet Explorer
5.5. Attackers may send a maliciously crafted e-mail to a
host; if the host opens the e-mail in Outlook Express,
attackers may execute arbitrary code on the host.
SMTP:OVERFLOW:OUTLOOK-CERT-OF
sos5.0.0,
sos5.1.0
high
This protocol anomaly is a server reply line in an SMTP
connection that is too long. This may indicate a buffer
overflow attempt by a compromised or malicious SMTP
server.
SMTP:OVERFLOW:REPLY-LINE
sos5.0.0,
sos5.1.0
critical
This signature detects attempts to exploit a vulnerability in
Sendmail. Sendmail versions 5.79 to 8.12.7 are vulnerable.
Attackers may include multiple empty address containers
in an SMTP header field to overflow the SMTP header buffer
and force Sendmail to execute arbitrary code on the host;
attackers may obtain root access.
SMTP:OVERFLOW:SENDMAIL-CMT-OF1
sos5.0.0,
sos5.1.0
critical
This signature detects attempts to exploit a vulnerability in
Sendmail. Sendmail versions 5.79 to 8.12.7 are vulnerable.
Attackers may include multiple empty address containers
in an SMTP header field to overflow the SMTP header buffer
and force Sendmail to execute arbitrary code on the host.
SMTP:OVERFLOW:SENDMAIL-CMT-OF2
Copyright © 2010, Juniper Networks, Inc.
926
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...