Snort mailing list archives

Re: False positives with SMTP RCPT TO overflow rule


From: Matt Kettler <mkettler () evi-inc com>
Date: Tue, 25 Jun 2002 14:16:14 -0400

This came up a week or so ago. My general recommendation is that unless you run a vulnerable mailserver, kill this rule completely.

AFAIK this rule is easily bypassed by an attacker, and readily false-prone due to SMTP command pipelining. IMHO this rule is so completely broken has no place in a general-purpose deployment of snort.

At 11:09 AM 6/25/2002 -0600, Nels Lindquist wrote:
Hi there.

I just updated my signatures to the latest ones (as of June 24,
anyway) and suddenly I'm getting hundreds of alerts on SMTP RCPT TO
overflow.



-------------------------------------------------------
This sf.net email is sponsored by: Jabber Inc.
Don't miss the IM event of the season | Special offer for OSDN members! JabConf 2002, Aug. 20-22, Keystone, CO http://www.jabberconf.com/osdn
_______________________________________________
Snort-users mailing list
Snort-users () lists sourceforge net
Go to this URL to change user options or unsubscribe:
https://lists.sourceforge.net/lists/listinfo/snort-users
Snort-users list archive:
http://www.geocrawler.com/redir-sf.php3?list=snort-users


Current thread: