Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> SMTP problems >> XTramail MTA 'HELO' denial


Vulnerability Assessment Details

XTramail MTA 'HELO' denial

Vulnerability Assessment Summary
Overflows the remote SMTP server

Detailed Explanation for this Vulnerability Assessment
There is a buffer overflow
when this MTA is issued the 'HELO' command
passed by an argument that is too long.

The HELO command is typically one of the first
commands required by a mail server. The command
is used by the mail server as a first attempt to
permit the client to identify itself. As such, this
command occurs before there is any authentication
or validation of mailboxes, etc.

This problem may permit a possible hacker to
execute arbitrary code on this computer,
or to disable your ability to send or
receive emails.

Solution : contact your vendor for a patch.

Network Security Threat Level: High

Networks Security ID: 791

Vulnerability Assessment Copyright: This script is Copyright (C) 1999 Renaud Deraison

Cables, Connectors

Sonicwall SOHo3 10 Users Model APL04-022
$10.0
Sonicwall SOHo3 10 Users Model APL04-022 pictureNew Cisco ASA5505 Firewall Bundle ASA5505-BUN-K9 Security Appliance
$199.99
New Cisco ASA5505 Firewall Bundle ASA5505-BUN-K9 Security Appliance pictureNew Sealed Cisco ASA5505 Firewall Bundle ASA5505-BUN-K9 Security Appliance
$240.0
New Sealed Cisco ASA5505 Firewall Bundle ASA5505-BUN-K9 Security Appliance pictureNew Netgear NETGEAR ProSAFE FVS318G 8-Port Gigabit VPN Firewall FVS318G-200NAS
$62.99
New Netgear NETGEAR ProSAFE FVS318G 8-Port Gigabit VPN Firewall FVS318G-200NAS picture


Discussions

No Discussions have been posted on this vulnerability.