|
Sonicwall SignaturesAll Categories Category: SMTPSMTP Category DescriptionThis SonicWALL IPS signature category consists of a group of signatures that can detect and prevent SMTP-related intrusions. SMTP or Simple Mail Transfer Protocol is the dominant text-based protocol used to transfer mail over the internet. However, because it is the de facto standard that defines how Mail Transfer Agents (MTAs) "speak" to one another when sending mail, SMTP is widely used by attackers to compromise mail servers. Using malformed SMTP requests, attackers can exploit vulnerabilities in MTAs, causing them to malfunction, and allowing the attackers to execute arbitrary commands on these servers, corrupt or steal sensitive information, or cause the server to crash, shutting down all e-mail communication through that server. The attacks are generally specific to the MTA that is running on the server. The most commonly used MTA is Sendmail, and so a majority of SMTP attacks target this application. Sendmail is the stantard MTA for UNIX derivative operating systems. Attackers targeting Sendmail can use one of several techniques including:
These vulnerabilites, however, are not confined to Sendmail: MTAs that implement SMTP including CSM Mail Server, Microsoft Exchange Server, and NetWin DSMTP server all have similar buffer overflow and request mishandling vulnerabilities. SonicWALL SMTP signatures are classified from low- to high-priority, and when enabled for prevention, can keep suspicious SMTP requests from reaching a mail server in the first place. Still, it is still important to note that security patches and updated versions for the above software are available from their vendors which close up vulnerabilites to SMTP attacks. SonicWALL signatures should be used in conjunction with, rather than as a replacement for, such critical sotware updates. |
|
© SonicWall 2020 | Privacy Policy | Conditions for use Version: 10.0 |