RLOGIN: Username Buffer Overflow
This protocol anomaly triggers when it detects an RLOGIN connection with a specified user name (local or remote) that is too long. This can indicate a buffer overflow attempt.
Extended Description
An rlogin datagram on TCP port 513 that contains a username field greater than 8 bytes constitutes a protocol anomaly. The detection of this message could indicate a network configuration error, or that a buffer overflow attack is being attempted by injecting malformed rlogin datagrams into the network.
References
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3