NFS Destination Netname Too Long

This protocol anomaly is an NFS packet with an authentication scheme of AUTH_DES that has destination netname that is too long. The NFS RFC specifies 255 bytes as the destination netname maximum.

Extended Description

A protocol anomaly exists if an RPC NFS message containing a netname that exceeds the maximum length. Some NFS implementations may be vulnerable in how they process such unusual exception conditions. The security flaws in these products may be exploited for denial of service or other attacks.

Short Name
NFS:ERR:LONG-NETNAME
Severity
Major
Recommended
False
Recommended Action
None
Category
NFS
Release Date
04/22/2003
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3324
False Positive
Unknown

Found a potential security threat?