Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

IMAP:OVERFLOW:LINE

Severity

High

Recommended

Yes

Category

IMAP

Keywords

Line Buffer Overflow

Release Date

2003/04/22

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

IMAP: Line Buffer Overflow


This protocol anomaly triggers when it detects an IMAP line (from the client to the server) that is too long. This can indicate a buffer overflow attempt. NOTE: Long lines are parsed, which can generate other IMAP overflow errors.

Extended Description

This signature detects malformed IMAP messages having a command line that is too long. Receiving such a message may indicate an attack attempt. The impact of the flaw depends on how a vulnerable IMAP server handles such a malformed message.

References

  • BugTraq: 15006
  • BugTraq: 15753
  • CVE: CVE-2005-3155
  • CVE: CVE-2005-2923
  • URL: http://www.cse.ohio-state.edu/cgi-bin/rfc/rfc2060.html

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out