Qmail length denial of service attack |
---|
Risk Level: | Low | Check or Attack Name: qmailswap |
---|---|---|
Platforms: | Qmail: 1.01 and earlier | |
Description: | This attack starves the target of swap resources by sending a large number of bytes of filler as an SMTP command. False Positive: It's possible that a very large e-mail on a single line will trigger this signature, but not represent an attack. |
|
Remedy: | Upgrade your version of qmail to 1.02 or later. See http://www.qmail.org/. |
|
References: |
Know Your Risks |