File: 1340.txt

package info (click to toggle)
snort 2.7.0-20.4
  • links: PTS
  • area: main
  • in suites: lenny
  • size: 34,512 kB
  • ctags: 18,772
  • sloc: ansic: 115,404; sh: 10,893; makefile: 1,372; perl: 487; sql: 213
file content (63 lines) | stat: -rw-r--r-- 1,509 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
Rule:

--
Sid:
1340

--
Summary:
Attempted tfp command access via web

--
Impact:
Possible attempt to gain information using the Trivial File Transfer
Protocol (tfp) to  access sensitive files on a webserver. It is also
possible that an  attempt is being made to remotely boot or reboot a
device using  tfp.

--
Detailed Information:
This is an attempt to gain intelligence from sensitive system files on a
webserver.  Tftp is a variation of the File Transfer Protocol that can
be used to  transfer files from one host to another, one feature it has
is that it  can be used to boot or reboot various network devices
without authentication  being needed. The attacker could possibly gain
information needed  for other attacks on the system, including the
retrieval of password  files.

--
Attack Scenarios:
The attacker can make a standard HTTP request that contains 'tfp' in the
URI which can  then return requested files to an external server.

--
Ease of Attack:
Simple HTTP request.

--
False Positives:
None Known

--
False Negatives:
None Known

--
Corrective Action:

Webservers should not be allowed to view or execute files and binaries
outside  of it's designated web root or cgi-bin. This command may also
be requested  on a command line should the attacker gain access to the
machine.  Non-essential binaries should be removed from a webserver once
it is in  production.
--
Contributors:
Sourcefire Research Team

-- 
Additional References:

CERT
http://www.cert.org/advisories/CA-1990-02.html

--