Rule Category

PROTOCOL-IMAP -- Snort alerted on Internet Message Access Protocol (IMAP) traffic, an email retrieval system for clients over TCP/IP connection. This protocol handles emails on a remote server, so all actions are processed on that server rather than the user client. This protocol is vulnerable to injection, restriction and process evasions, leaks, relay abuse, and other attacks.

Alert Message

PROTOCOL-IMAP STATUS overflow attempt

Rule Explanation

This event is generated when a buffer overflow attempt is detected in an IMAP server STATUS command. Impact: Attempted Administrator Privilege Gain Details: Ease of Attack:

What To Look For

No information provided

Known Usage

No public information

False Positives

No known false positives

Contributors

Cisco Talos Intelligence Group

Rule Groups

No rule groups

CVE

Rule Vulnerability

CVE Additional Information

This product uses data from the NVD API but is not endorsed or certified by the NVD.
CVE-2004-1211
Loading description
CVE-2005-1256
Loading description
CVE-2005-2278
Loading description
CVE-2005-3314
Loading description
CVE-2017-1274
Loading description