Short Name |
SMTP:OVERFLOW:TEXT-LINE-OF |
---|---|
Severity |
Major |
Recommended |
No |
Category |
SMTP |
Keywords |
SMTP OVERFLOW TEXT LINE |
Release Date |
2003/08/27 |
Update Number |
1213 |
Supported Platforms |
di-5.3+, idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This protocol anomaly triggers when it detects a text line (in the data section) in an SMTP connection that is too long. This can indicate a buffer overflow attempt.
SpamAssassin is reported prone to a remote denial of service vulnerability. Full details regarding this vulnerability are not known. A remote attacker may potentially exploit this vulnerability to deny service to a target SpamAssassin service. SpamAssassin versions prior to 2.64 are reported vulnerable to this issue. This BID will be updated as further details regarding this vulnerability are announced.