Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> SMTP problems >> XTramail MTA 'HELO' denial


Vulnerability Assessment Details

XTramail MTA 'HELO' denial

Vulnerability Assessment Summary
Overflows the remote SMTP server

Detailed Explanation for this Vulnerability Assessment
There is a buffer overflow
when this MTA is issued the 'HELO' command
passed by an argument that is too long.

The HELO command is typically one of the first
commands required by a mail server. The command
is used by the mail server as a first attempt to
permit the client to identify itself. As such, this
command occurs before there is any authentication
or validation of mailboxes, etc.

This problem may permit a possible hacker to
execute arbitrary code on this computer,
or to disable your ability to send or
receive emails.

Solution : contact your vendor for a patch.

Network Security Threat Level: High

Networks Security ID: 791

Vulnerability Assessment Copyright: This script is Copyright (C) 1999 Renaud Deraison

Cables, Connectors

CISCO SYSTEMS CATALYST EXPRESS 500 SERIES
$45.0
CISCO SYSTEMS CATALYST EXPRESS 500 SERIES pictureCisco # 73-3023-04 board for a FastHub 100 Series 24-Port Hub
$8.99
Cisco # 73-3023-04 board for a FastHub 100 Series 24-Port Hub pictureCisco/Delta ADP-10KB 48V Power Supply (P/N 34-1537-02 Rev:A0) 200mA
$12.99
Cisco/Delta ADP-10KB 48V Power Supply (P/N 34-1537-02 Rev:A0) 200mA pictureNEC MC-278 8MB FPM DRAM SIMM 60ns 72-pin (for Cisco)
$6.99
NEC MC-278 8MB FPM DRAM SIMM 60ns 72-pin (for Cisco) picture


Discussions

No Discussions have been posted on this vulnerability.