File: 2409.txt

package info (click to toggle)
snort 2.7.0-20.4
  • links: PTS
  • area: main
  • in suites: lenny
  • size: 34,512 kB
  • ctags: 18,772
  • sloc: ansic: 115,404; sh: 10,893; makefile: 1,372; perl: 487; sql: 213
file content (65 lines) | stat: -rw-r--r-- 1,233 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
Rule:  

--
Sid:
2409

--
Summary:
This event is generated when an attempt is made to overflow a buffer by
supplying a very long username to an APOP POP3 service.

--
Impact:
Serious. Several POP3 servers are vulnerable to USER buffer overflows.

--
Detailed Information:
By supplying more than 626 bytes of data to the APOP USER command on 1st
Class Internet Solutions' 1st Class Mail Server, an attacker may
overflow a buffer resulting in the opportunity to execute code of their
choosing on the targeted machine with the privileges of the user running
the service.

Other Mail software may be prone to this attack.

--
Affected Systems:
	1st Class Mail Server

--
Attack Scenarios:
An attacker may connect to the service and supply an over-long username
to overflow the buffer.

--
Ease of Attack:
Simple.

--
False Positives:
None known.

--
False Negatives:
None known

--
Corrective Action:
Apply the appropriate vendor supplied patches.

Upgrade to the latest non-affected version of the software.

Check for other events generated by the source IP address.

--
Contributors:
Sourcefire Research Team
Matt Watchinski <mwatchinski@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>

-- 
Additional References:


--