File: 1066.txt

package info (click to toggle)
snort 2.7.0-20.4
  • links: PTS
  • area: main
  • in suites: lenny
  • size: 34,512 kB
  • ctags: 18,772
  • sloc: ansic: 115,404; sh: 10,893; makefile: 1,372; perl: 487; sql: 213
file content (64 lines) | stat: -rw-r--r-- 1,345 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
Rule:

--
Sid:
1066

--
Summary:
This event is generated when an attempt is made to access telnet.exe on a remote
web server via a web request.

--
Impact:
Information gathering and system integrity compromise. Possible unauthorized
administrative access to the server. Possible execution of arbitrary code of 
the attackers choosing in some cases.

--
Detailed Information:
This event is generated when an attempt is made to acess telnet.exe on a remote
web server.  The attacker can use telnet to directly connect to other computers
and launch attacks from the web server.

This event indicates that an attempt has been made to execute the
program telnet.exe using a web request.

--
Affected Systems:
	All systems using a web server.

--
Attack Scenarios:
The attacker may use telnet to access other machines or compromise the
resources on the target system.

--
Ease of Attack:
Simple. Exploits exist.

--
False Positives:
None known.

--
False Negatives:
None known.

--
Corrective Action:
Ensure the system is using an up to date version of the software and has
had all vendor supplied patches applied.

Check the host logfiles and application logs for signs of compromise.

--
Contributors:
Original rule writer unknown
Sourcefire Vulnerability Research Team
Nigel Houghton <nigel.houghton@sourcefire.com>

-- 
Additional References:

--