""GPL POP3 APOP USER overflow attempt""
SID: 2102409
Revision: 2
Class Type: attempted-admin
Metadata: created_at 2010_09_23, updated_at 2013_03_18
Reference:
-
bugtraq
-
9794
Protocol: tcp
Source Network: $EXTERNAL_NET
Source Port: any
Destination Network: $HOME_NET
Destination Port: 110
Flow: to_server,established
Contents:
- Value: "APOP"
Within:
PCRE: "/^APOP\s+USER\s[^\n]{256}/smi"
Special Options:
- nocase