Short Name |
SMTP:OVERFLOW:TEXT-LINE-OF |
---|---|
Severity |
High |
Recommended |
No |
Category |
SMTP |
Keywords |
SMTP OVERFLOW TEXT LINE |
Release Date |
2003/08/27 |
Update Number |
1213 |
Supported Platforms |
di-5.3+, idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This protocol anomaly triggers when it detects a text line (in the data section) in an SMTP connection that is too long. This can indicate a buffer overflow attempt.
SpamAssassin is reported prone to a remote denial of service vulnerability. Full details regarding this vulnerability are not known. A remote attacker may potentially exploit this vulnerability to deny service to a target SpamAssassin service. SpamAssassin versions prior to 2.64 are reported vulnerable to this issue. This BID will be updated as further details regarding this vulnerability are announced.