File: 1242.txt

package info (click to toggle)
snort 2.7.0-20.4
  • links: PTS
  • area: main
  • in suites: lenny
  • size: 34,512 kB
  • ctags: 18,772
  • sloc: ansic: 115,404; sh: 10,893; makefile: 1,372; perl: 487; sql: 213
file content (67 lines) | stat: -rw-r--r-- 1,957 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
Rule:

--
Sid:
1242

--
Summary:
This event is generated when an attempt is made to access the .ida Indexing Service ISAPI filter. 

--
Impact:
Intelligence gathering activity. If an .ida file is erroneously shared from a network share, an error message is returned from a request that contains the share path will be disclosed.

--
Detailed Information:
Microsoft Internet Information Service (IIS) installs several Internet Service Application Programming Interface (ISAPI) extensions.  The .ida ISAPI filter provides support for administrative scripts.  Files with the .ida suffix should not be located on network shares.  If an attempt is made to access them from a network share, an error message is returned disclosing the share path.  

--
Affected Systems:
Hosts running IIS 4.0
Hosts running IIS 5.0

--
Attack Scenarios:
An attacker can attempt to access a file with the .ida suffix in an attempt to receive an error message with disclosure about the share path.

--
Ease of Attack:
Simple. 

--
False Positives:
The HotSaNIC (hotsanic.sourceforge.net) System and Network Info Centre
can graph the occurence of worms attacks on a server against time. The
HotSaNIC system displays 'WEB-IIS ISAPI .ida access' attempts on the
server in images named default.ida-year.gif, default.ida-month.gif,
default.ida-week.gif and also using a web page default.ida.html. Each
time any of these components are accessed it generates an event.

--
False Negatives:
None Known.

--
Corrective Action:
Do not place files with the .ida suffix on a network share.
 

--
Contributors:
Original rule written by Dr SuSE and C. Mayor 
Modified by Brian Caswell <bmc@sourcefire.com>
Sourcefire Research Team
Judy Novak <judy.novak@sourcefire.com>
False positive information contributed by Chris McMahon <chris@mcmahon.co.uk>
--
Additional References:

Arachnids
http://www.whitehats.com/info/IDS552

CVE
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2000-0071


--