Short Name |
NFS:ERR:LONG-NETNAME |
---|---|
Severity |
High |
Recommended |
No |
Category |
NFS |
Release Date |
2003/04/22 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This protocol anomaly is an NFS packet with an authentication scheme of AUTH_DES that has destination netname that is too long. The NFS RFC specifies 255 bytes as the destination netname maximum.
A protocol anomaly exists if an RPC NFS message containing a netname that exceeds the maximum length. Some NFS implementations may be vulnerable in how they process such unusual exception conditions. The security flaws in these products may be exploited for denial of service or other attacks.