Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> SMTP problems >> XTramail MTA 'HELO' denial


Vulnerability Assessment Details

XTramail MTA 'HELO' denial

Vulnerability Assessment Summary
Overflows the remote SMTP server

Detailed Explanation for this Vulnerability Assessment
There is a buffer overflow
when this MTA is issued the 'HELO' command
passed by an argument that is too long.

The HELO command is typically one of the first
commands required by a mail server. The command
is used by the mail server as a first attempt to
permit the client to identify itself. As such, this
command occurs before there is any authentication
or validation of mailboxes, etc.

This problem may permit a possible hacker to
execute arbitrary code on this computer,
or to disable your ability to send or
receive emails.

Solution : contact your vendor for a patch.

Network Security Threat Level: High

Networks Security ID: 791

Vulnerability Assessment Copyright: This script is Copyright (C) 1999 Renaud Deraison

Cables, Connectors

Plugable USB Type-C Flash Memory Card Reader
$37.94
Plugable USB Type-C Flash Memory Card Reader pictureCreative Waterproof USB 2.0 Flash Drive Memory Storage Thumb U Disk Blue
$8.85
Creative Waterproof USB 2.0 Flash Drive Memory Storage Thumb U Disk Blue pictureCreative Waterproof USB 2.0 Flash Drive Memory Storage Thumb U Disk Blue
$8.85
Creative Waterproof USB 2.0 Flash Drive Memory Storage Thumb U Disk Blue pictureCreative Waterproof USB 2.0 Flash Drive Memory Storage Thumb U Disk Blue
$9.48
Creative Waterproof USB 2.0 Flash Drive Memory Storage Thumb U Disk Blue picture


Discussions

No Discussions have been posted on this vulnerability.