FTP: Pathname Too Long

This protocol anomaly triggers when it detects a pathname in an FTP command (RETR, STOR, APPE, SMNT, RNFR, RNTO, DELE, RMD, MKD, STAT, CWD, LIST, NLST) exceeds the length threshold. This can be an attempt to overflow the server. Default value is 512. You can set the FTP pathname length threshold to a higher or lower value. In IDP Manager: Select a security policy from Security Policies, then select the Sensor Settings tab. Select Protocol Thresholds and Configuration > FTP. In Netscreen-Security Manager: in the device navigation tree select Security > IDP SM Settings, then select the Protocol Thresholds and Configuration tab. Under FTP, click the Show button. Set the Maximum Pathname length to the new value and click OK.

Extended Description

Such conditions could indicate a configuration or implementation error, or it could indicate that an attack against FTP servers or clients is underway.

Short Name
FTP:OVERFLOW:PATH-TOO-LONG
Severity
Major
Recommended
True
Recommended Action
Drop
Category
FTP
Keywords
CVE-2004-1135 CVE-2010-0625 bid:11772 bid:39041 bid:41762 ftp
Release Date
08/27/2003
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3703
False Positive
Rarely
CVSS Score

6.5

Found a potential security threat?