File: 697.txt

package info (click to toggle)
snort 2.3.3-11
  • links: PTS
  • area: main
  • in suites: etch, etch-m68k
  • size: 22,512 kB
  • ctags: 11,344
  • sloc: ansic: 70,967; sh: 4,848; makefile: 748; perl: 478; sql: 212
file content (64 lines) | stat: -rw-r--r-- 1,396 bytes parent folder | download | duplicates (8)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
Rule:

--
Sid:
697

--
Summary:
This event is generated when an attempt is made to exploit a known
vulnerability in Microsoft SQL.

--
Impact:
Information gathering and data integrity compromise. Possible unauthorized
administrative access to the server or application.

--
Detailed Information:
This event is generated when an attempt is made to gain unauthorized
access to an implementation of Microsoft SQL server or client.  This can
lead to unauthorized access and possibly escalated privileges to that of 
the administrator. Data stored on the machine can be compromised and 
trust relationships between the victim server and other hosts can be 
exploited by the attacker.

--
Affected Systems:

--
Attack Scenarios:
An attacker can access the authentication mechanism and supply his/her
own credentials to gain access. Alternatively the attacker can exploit
weaknesses to gain access as the administrator.

--
Ease of Attack:
Simple. Exploits exist.

--
False Positives:
None known.

--
False Negatives:
None known.

--
Corrective Action:
Disallow administrative access from sources external to the protected
network.

Ensure the system is using an up to date version of the software and has
had all vendor supplied patches applied.

--
Contributors:
Sourcefire Research Team
Brian Caswell <bmc@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>

--
Additional References:

--