Network Associates WebShield SMTP...

- AV AC AU C I A
发布: 2000-08-18
修订: 2025-04-13

A certain configuration of Network Associates WebShield SMTP is vulnerable to a remote denial of service attack. If WebShield and the mailserver are installed on the same machine and the "Direct Send" option has been enabled in the "Delivery" - "Mail Send" configuration in WebShield, this vulnerability can be exploited by sending an email with a dot character trailing the domain name such as 'user@companyxyz.com.' In this case, Company XYZ with the domain of companyxyz.com is used as an example. The server running WebShield SMTP at Company XYZ does not recognize that 'user@companyxyz.com.' is equivalent to 'user@companyxyz.com' even though both are Fully Qualified Domain Names (FQDN). Therefore, if a remote user attempts to send an email to 'user@companyxyz.com.' (note the trailing period), WebShield SMTP will not recognize 'companyxyz.com.' as a local domain. WebShield SMTP will then proceed to look up the MX (mail exchange, enables querying of MX records from a Domain Name...

0%
当前有1条漏洞利用/PoC
当前有0条受影响产品信息