File: 1327.txt

package info (click to toggle)
snort 2.7.0-20.4
  • links: PTS
  • area: main
  • in suites: lenny
  • size: 34,512 kB
  • ctags: 18,772
  • sloc: ansic: 115,404; sh: 10,893; makefile: 1,372; perl: 487; sql: 213
file content (73 lines) | stat: -rw-r--r-- 1,492 bytes parent folder | download | duplicates (4)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
Rule:

--
Sid:
1327

--
Summary:
Secure Shell (SSH) is used to remotely manage systems over encrypted TCP
sessions. This event is generated when an attempt is made to exploit 
vulnerable versions of the SSH daemon.

--
Impact:
System compromize presenting the attacker with root privileges. Denial 
of Service (DoS) on certain network devices.

--
Detailed Information:
A flaw in the CRC32 compensation attack detection code may result in 
arbitrary code execution with the privileges of the user running the SSH
daemon (usually root).

Some Netscreen devices may suffer a Denial of Service.

Affected Systems:
	OpenSSH versions prior to 2.2
	Multiple Cisco network devices
	Multiple Netscreen network devices
	SSH Secure Communications prior to 1.2.31

--
Attack Scenarios:
The attacker would need to send specially crafted large SSH packets to 
cause the overflow and present the opportunity to write values to memory
locations.

Exploit scripts are available

--
Ease of Attack:
Simple. Exploits are available.

--
False Positives:
None Known

--
False Negatives:
None Known

--
Corrective Action:
Upgrade to the latest non-affected version of the software.

Apply the appropriate vendor supplied patches.

--
Contributors:
Original rule writer unknown
Sourcefire Research Team
Nigel Houghton <nigel.houghton@sourcefire.com>

--
Additional References:

CERT:
http://www.kb.cert.org/vuls/id/945216

Analysis by David Dittrich:
http://staff.washington.edu/dittrich/misc/ssh-analysis.txt

--