File: 1347.txt

package info (click to toggle)
snort 2.7.0-20.4
  • links: PTS
  • area: main
  • in suites: lenny
  • size: 34,512 kB
  • ctags: 18,772
  • sloc: ansic: 115,404; sh: 10,893; makefile: 1,372; perl: 487; sql: 213
file content (65 lines) | stat: -rw-r--r-- 1,372 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
Rule:

--
Sid:
1341

--
Summary:
Attempted g++ command access via web

--
Impact:
Attempt to compile a binary on a host.

--
Detailed Information:
This is an attempt to compiile a C or C++ source on a host. The g++
command is the GNUproject's C and C++ compiler used to compile C and
C++ source filesinto executable binary files. The attacker could
possibly compile aprogram needed for other attacks on the system or
install a binaryprogram of his choosing.

--
Attack Scenarios:
The attacker can make a standard HTTP request that contains
'/usr/bin/g++'in theURI.

--
Ease of Attack:
Simple HTTP request.

--
False Positives:
None Known

--
False Negatives:
None Known

--
Corrective Action:

Webservers should not be allowed to view or execute files and binaries
outside of it'sdesignated web root or cgi-bin. This command may also
be requested ona command line should the attacker gain access to the
machine. Wheneverpossible, sensitive files and certain areas of the
filesystem shouldhave the system immutable flag set to prevent files
from being addedto the host. On BSD derived systems, setting the
systems runtimesecurelevel also prevents the securelevel from being
changed. (note: thesecurelevel can only be increased).
--
Contributors:
Sourcefire Research Team

-- 
Additional References:
sid: 1342
sid: 1343
sid: 1344
sid: 1345
sid: 1346
sid: 1347
sid: 1348

--