[Snort-sigs] Documentation: SID 293
alexander.s at ...1565...
Fri Jun 20 09:07:31 EDT 2003
IMAP EXPLOIT overflow
This is an attempt to exploit a buffer overflow in the IMAP service
An attacker can gain remote root access.
The signature looks for a piece of shellcode (executable code) used to
exploit an known vulnerability in the IMAP service.
The attack is done remotely and gains privileged remote access.
Ease of Attack:
Simple. An exploit is readily available.
Install the available security patches from your vendor.
Rule Documentation - Steven Alexander<alexander.s at ...1565...>
More information about the Snort-sigs