IDS mailing list archives
ISS Proventia email overflow
From: "Albert R. Campa" <abcampa () gmail com>
Date: Mon, 19 Nov 2007 16:28:23 -0600
Hi guys, I am getting spurts of events trigerred by ISS Proventia, with the following vuln description: Vulnerability description In buffer overflow attacks, an attacker supplies data that is longer than the available space to hold it. For stack allocated variables, this usually means the attacker can corrupt other variables and eventually modify the code that is executed when the function in which the overflow occurs ends. http://www.iss.net/security_center/reference/vuln/EMail_Generic_Intel_Overflow.htm They are from a trusted mail server so its not being blocked. Do you think this is just a true false positive or is this trusted mail server sending bad packets? ------------------------------------------------------------------------ Test Your IDS Is your IDS deployed correctly? Find out quickly and easily by testing it with real-world attacks from CORE IMPACT. Go to http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=intro_sfw to learn more. ------------------------------------------------------------------------
Current thread:
- ISS Proventia email overflow Albert R. Campa (Nov 20)
- Re: ISS Proventia email overflow David Maynor (Nov 20)
- Re: ISS Proventia email overflow Albert R. Campa (Nov 20)
- Re: ISS Proventia email overflow David Maynor (Nov 20)
- Re: ISS Proventia email overflow Albert R. Campa (Nov 20)
- Re: ISS Proventia email overflow Albert R. Campa (Nov 20)
- Re: ISS Proventia email overflow David Maynor (Nov 20)
- RE: ISS Proventia email overflow Mike Theriault (Nov 20)