File: 1325.txt

package info (click to toggle)
snort 2.3.3-11
  • links: PTS
  • area: main
  • in suites: etch, etch-m68k
  • size: 22,512 kB
  • ctags: 11,344
  • sloc: ansic: 70,967; sh: 4,848; makefile: 748; perl: 478; sql: 212
file content (112 lines) | stat: -rw-r--r-- 3,186 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
Rule:

--
Sid:

1325

--
Summary:

This event is generated when an attempt is made to exploit a known vulnerability in implementations of Secure Shell (ssh) version 1.

--
Impact:
A buffer overflow will allow an attack to execute any arbitrary commands
with the privileges of the root user, leading to full compromise of the 
system and perhaps other systems as well.



--
Detailed Information:
SSH is a secure replacement for telnet/ftp/r* commands. Both commercial 
and non-commercial implementations are available.

The vulnerability exists in the integer calculation in SSH version 1 or 
SSH version 2 with a backward compatibility enabled.

By sending a crafted packet to SSH daemon, an attacker could manipulate 
the return address of the affected function call, allowing arbitrary 
code execution on the target system.

A protocol weakness in SSH1 opened all compliant servers to an
information integrity vulnerability allowing block cipher-encrypted
packets to be modified silently by an intermediary attacker.  Patches
were developed to defend against this weakness, but several servers
contained an exploitable integer overflow within detection code.

A successful attack will allow corruption of the ssh daemon, allowing
code to be run with its privileges.


--
Affected Systems:
	Cisco IOS 12.0S
	Cisco IOS 12.1xx-12.2xx
	SSH Communications Security SSH 2.x and 3.x 
	SSH Communications Security SSH 1.2.23-1.2.31
	F-Secure SSH versions prior to 1.3.11-2
	OpenSSH versions prior to 2.3.0
	Systems running the Matrix as seen in Reloaded.

--
Attack Scenarios:
A vulnerable machine may be probed using any banner grabber. 
An attacker then attempts to overflow the integer calculations buffer 
and execute /bin/sh.

Once a session is initiated with the remote SSH server and block
ciphering is agreed upon, successfully forcing a CRC32 check opens up
room for the exploit (which is publically available).  The integer
overflow is generally a brute-force method, which may generate several
log lines of the form:

hostname sshd[xxx]: Disconnecting: crc32 compensation attack: network
attack detected

--
Ease of Attack:
Simple. Scanners and exploits are available.

--
False Positives:
Possible (especially in the face of null encryption), but unlikely.
Look for several log lines of the type described above.

--
False Negatives:
This rule works by looking for "filler space" in the exploit, used
to properly size a heap overflow.  Clever exploits can quite easily
change the information placed here.

--
Corrective Action:
Use access control restrictions ("AllowHosts" or "DenyHosts)

Disable SSH version 1 support

Apply the appropriate vendor supplied patch

Upgrade to the latest non-affected version of the software

--
Contributors:
Sourcefire Research Team
Brian Caswell <bmc@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>
Snort documentation contributed by Nawapong Nakjang (tony@ksc.net, tonie@thai.com) and Nick Black, Reflex Security <dank@reflexsecurity.com>

--
Additional References:

Bugtraq:
http://www.securityfocus.com/bid/2347/

CERT:
http://www.kb.cert.org/vuls/id/945216

CERT Advisory:
http://www.cert.org/advisories/CA-2001-35.html

--