Short Name |
FTP:OVERFLOW:LINE-TOO-LONG |
---|---|
Severity |
Major |
Recommended |
Yes |
Recommended Action |
Drop |
Category |
FTP |
Keywords |
Line Too Long |
Release Date |
2003/04/22 |
Update Number |
1213 |
Supported Platforms |
di-5.3+, idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This protocol anomaly indicates an incoming FTP line that is too long. This can indicate an attempt to overflow the server. Default value: 1024. You can set the FTP line length threshold to a higher or lower value. In IDP Manager: Select a security policy from Security Policies, then select the Sensor Settings tab. Select Protocol Thresholds and Configuration > FTP. In Netscreen-Security Manager: In the device navigation tree select Security > IDP SM Settings, then select the Protocol Thresholds and Configuration tab. Under FTP, click the Show button. Set the Maximum Line Length to the new value and click OK.
BisonFTP Server is prone to a remote buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. Attackers can exploit this issue to execute arbitrary code within the context of the application. Failed attacks may cause a denial-of-service condition. BisonFTP Server versions 3.5 and prior are affected.