[Snort-users] chameleon overflow
paulie at ...2160...
Fri Jun 8 18:05:52 EDT 2001
I get losta fals positives on this rule...I have been meaning to disable
Heres the rule:
alert tcp $EXTERNAL_NET any -> $HOME_NET 25 (msg:"IDS266 - CAN-1999-0261
- SMTP Chameleon Overflow"; content: "HELP"; nocase; flags: AP; dsize: >500;
So basically it alarms on any inbound smtp packet big enough and with the
ever so infrequent word HELP in it.
Unless you are running the Chameleon STMP server its prolly not useful
On Fri, 8 Jun 2001, Matt Hand wrote:
> I was checking through yesterday's logs and ran across a SMTP chameleon overflow, which is unusual for us. The logs are from a machine running DNS and acting as our mail server.
> The arachNIDs database says its unlikely the ip address was spoofed so I checked and it belongs to cheetahmail.com. Has anyone experienced anything similar and, if so, what did you do about it?
> In any case, here are the relevant lines from the log file:
> Jun 7 16:27:05 chia snort: SMTP chameleon overflow: 18.104.22.168:41226 -> 22.214.171.124:25
> Jun 7 16:27:05 chia named: "optonline.net IN MX" points to a CNAME (mail-relay.optonline.net)
> Jun 7 16:27:05 chia named: "optonline.net IN MX" points to a CNAME (mail-hub.optonline.net)
> Thanks for the help.
> Matt Hand
> matt at ...1740...
> Snort-users mailing list
> Snort-users at lists.sourceforge.net
> Go to this URL to change user options or unsubscribe:
> Snort-users list archive:
More information about the Snort-users