File: 2315.txt

package info (click to toggle)
snort 2.3.3-11
  • links: PTS
  • area: main
  • in suites: etch, etch-m68k
  • size: 22,512 kB
  • ctags: 11,344
  • sloc: ansic: 70,967; sh: 4,848; makefile: 748; perl: 478; sql: 212
file content (73 lines) | stat: -rw-r--r-- 1,697 bytes parent folder | download | duplicates (8)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
Rule:

--
Sid:
2315

--
Summary:
This event is generated when an attempt is made to exploit a known
vulnerability in the Microsoft Windows Workstation service.

--
Impact:
Serious. Denial of Service (DoS), execution of arbitrary code is
possible.

--
Detailed Information:
Due to insufficient bounds checking in the Microsoft Windows Workstation
service, it may be possible for an attacker to overwrite portions of
memory. This can result in the attacker being presented with the
opportunity to execute code of their choosing. Under some circumstances
a Denial of Service condition may be possible against the target host.

Specifically, the DCE/RPC service allows for overly long strings to be
sent to the Workstation logging function. This logging function does not
check parameters sufficiently which results in the buffer overflow
condition.

--
Affected Systems:
	Microsoft Windows 2000 Service Pack 2, Service Pack 3, Service Pack 4
	Microsoft Windows XP, Microsoft Windows XP Service Pack 1
	Microsoft Windows XP 64-Bit Edition

--
Attack Scenarios:
The attacker may use one of the available exploits to target a
vulnerable host.

--
Ease of Attack:
Simple. Exploit code exists.

--
False Positives:
None known.

--
False Negatives:
None known

--
Corrective Action:
Apply the appropriate vendor supplied patches and service packs.

--
Contributors:
Sourcefire Research Team
Brian Caswell <bmc@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>

--
Additional References:

CERT:
http://www.cert.org/advisories/CA-2003-28.html
http://www.kb.cert.org/vuls/id/567620

Microsoft:
http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS03-049.asp

--