Short Name |
FTP:OVERFLOW:PATH-TOO-LONG |
---|---|
Severity |
Major |
Recommended |
Yes |
Recommended Action |
Drop |
Category |
FTP |
Keywords |
ftp |
Release Date |
2003/08/27 |
Update Number |
1213 |
Supported Platforms |
di-5.3+, idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This protocol anomaly triggers when it detects a pathname in an FTP command (RETR, STOR, APPE, SMNT, RNFR, RNTO, DELE, RMD, MKD, STAT, CWD, LIST, NLST) exceeds the length threshold. This can be an attempt to overflow the server. Default value is 512. You can set the FTP pathname length threshold to a higher or lower value. In IDP Manager: Select a security policy from Security Policies, then select the Sensor Settings tab. Select Protocol Thresholds and Configuration > FTP. In Netscreen-Security Manager: in the device navigation tree select Security > IDP SM Settings, then select the Protocol Thresholds and Configuration tab. Under FTP, click the Show button. Set the Maximum Pathname length to the new value and click OK.
Such conditions could indicate a configuration or implementation error, or it could indicate that an attack against FTP servers or clients is underway.