File: 2411.txt

package info (click to toggle)
snort 2.3.3-11
  • links: PTS
  • area: main
  • in suites: etch, etch-m68k
  • size: 22,512 kB
  • ctags: 11,344
  • sloc: ansic: 70,967; sh: 4,848; makefile: 748; perl: 478; sql: 212
file content (66 lines) | stat: -rw-r--r-- 1,342 bytes parent folder | download | duplicates (8)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
Rule:  

--
Sid:
2411

--
Summary:
This event is generated when an attempt is made to exploit a known
vulnerability in RealNetworks Helix Media Server.

--
Impact:
Serious. Execution of arbitrary code is possible.

--
Detailed Information:
Versions of RealNetworks Helix Media Server and RealSystem Server are
vulnerable to a buffer overflow condition that may present the attacker
with the opportunity to execute code of their choosing on the target
system.

This may then present the attacker with the opportunity to gain a remote
root shell, thus compromising the system.

--
Affected Systems:
	 Helix Universal Server 9.01, versions 9.0.2.794 and earlier
	  RealSystem Server 8.0 & 7.0

--
Attack Scenarios:
The attacker may probe for the existence of an affected server and then
use one of the publicly available scripts to exploit the service.

--
Ease of Attack:
Simple. Exploits exists.

--
False Positives:
None known.

--
False Negatives:
None known.

--
Corrective Action:
Apply the appropriate vendor supplied patches.

Upgrade to the latest non-affected version of the software.

--
Contributors:
Sourcefire Research Team
Matt Watchinski <mwatchinski@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>

-- 
Additional References:

RealNetworks
http://www.service.real.com/help/faq/security/rootexploit091103.html

--