Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> SMTP problems >> XTramail MTA 'HELO' denial


Vulnerability Assessment Details

XTramail MTA 'HELO' denial

Vulnerability Assessment Summary
Overflows the remote SMTP server

Detailed Explanation for this Vulnerability Assessment
There is a buffer overflow
when this MTA is issued the 'HELO' command
passed by an argument that is too long.

The HELO command is typically one of the first
commands required by a mail server. The command
is used by the mail server as a first attempt to
permit the client to identify itself. As such, this
command occurs before there is any authentication
or validation of mailboxes, etc.

This problem may permit a possible hacker to
execute arbitrary code on this computer,
or to disable your ability to send or
receive emails.

Solution : contact your vendor for a patch.

Network Security Threat Level: High

Networks Security ID: 791

Vulnerability Assessment Copyright: This script is Copyright (C) 1999 Renaud Deraison

Cables, Connectors

Lot of 2 Intel Xeon E5-2660 v4 14-Core 2.0GHz SR2N4 Processor
$1599.99
Lot of 2 Intel Xeon E5-2660 v4 14-Core 2.0GHz SR2N4 Processor pictureHH80556KJ0674M INTEL XEON 5150 DUAL CORE 2.66GHz 4M 1333MHz Procused & untested
$3.99
HH80556KJ0674M INTEL XEON 5150 DUAL CORE 2.66GHz 4M 1333MHz Procused & untested picture Xeon E5-2670V3 QEYK CPU 12C 2.2GHz LGA2011-3 Compatible X99
$145.0
 Xeon E5-2670V3  QEYK CPU 12C 2.2GHz  LGA2011-3 Compatible X99  pictureIntel Xeon QHUP E5-2699v4/E5-2699AV4 ES 2.1GHz 22C LGA2011-3 for x99
$630.0
Intel Xeon  QHUP E5-2699v4/E5-2699AV4  ES 2.1GHz 22C LGA2011-3  for x99 picture


Discussions

No Discussions have been posted on this vulnerability.