File: 1335.txt

package info (click to toggle)
snort 2.7.0-20.4
  • links: PTS
  • area: main
  • in suites: lenny
  • size: 34,512 kB
  • ctags: 18,772
  • sloc: ansic: 115,404; sh: 10,893; makefile: 1,372; perl: 487; sql: 213
file content (70 lines) | stat: -rw-r--r-- 1,861 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
Rule:

--
Sid:
1335

--
Summary:
Attempted kill command access via web

--
Impact:
Attempt to stop or restart processes on a webserver.

--
Detailed Information:
This is an attempt to either stop or restart system processes on a
webserver. By stopping a service the attacker can effectively issue a
"Denial of Service" to a particular process on a machine. When used to
restart a process, the attacker can force a legitimate process to
re-read the associated configuration file and possibly compromise the
service by replacing the original configuration with one crafted by the attacker.

The signature looks for the "kill" command in the client to
web server network traffic and does not indicate whether the command
was actually successful in killing the process. The presence of the
"kill" command in web traffic indicates that an attacker attempted to
trick the web server into executing system in non-interactive mode
i.e. without a valid shell session.

Alternatively this rule may trigger in an unencrypted HTTP tunneling
connection to the server or a shell connection via another exploit
against the web server.

--
Attack Scenarios:
The attacker can make a standard HTTP request that contains '/bin/kill'
in the URI which can then return sensitive information on groups and
users present on the host.  This command may also be requested on a
command line should the attacker gain access to the machine.

--
Ease of Attack:
Simple HTTP request.

--
False Positives:
None Known

--
False Negatives:
None Known

--
Corrective Action:
Webservers should not be allowed to view or execute files and binaries
outside of it's designated web root or cgi-bin. 

--
Contributors:
Sourcefire Research Team
Nigel Houghton <nigel.houghton@sourcefire.com>
Additional information from Anton Chuvakin <http://www.chuvakin.org>

-- 
Additional References:

man kill

--