File: 713.txt

package info (click to toggle)
snort 2.3.3-11
  • links: PTS
  • area: main
  • in suites: etch, etch-m68k
  • size: 22,512 kB
  • ctags: 11,344
  • sloc: ansic: 70,967; sh: 4,848; makefile: 748; perl: 478; sql: 212
file content (70 lines) | stat: -rw-r--r-- 1,272 bytes parent folder | download | duplicates (8)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
Rule:
--
Sid:
713

--
Summary:
This event is generated when an attempt is made to exploit a known
vulnerability in a Lucent/Livingston Portmaster router.

--
Impact:
Denial of Service (DoS).

--
Detailed Information:
This event is generated when an attempt is made to issue a Denial of
Service (DoS) attack against a Livingston/Lucent router. In some
situations malformed data sent to the Telnet service on the router can
cause the DoS to occur.

Lucent Portmaster routers were previously known as Livingston Portmaster
from Livingston Technologies.

--
Affected Systems:
	Lucent Portmaster 1.0
	Lucent Portmaster 2.0
	Lucent Portmaster 3.0

--
Attack Scenarios:
The attacker can use one of the publicly available exploit scripts.

--
Ease of Attack:
Simple. Exploit code exists.

--
False Positives:
None known

--
False Negatives:
None known.

--
Corrective Action:
The Portmaster series of routers is no longer available.

Disable the Telnet service if possible.

Reboot the router to regain the service

--
Contributors:
Original Rule Writer Unknown
Sourcefire Research Team
Nigel Houghton <nigel.houghton@sourcefire.com>

-- 
Additional References:

Bugtraq:
http://www.securityfocus.com/bid/2225

CVE:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0218

--