File: 1540.txt

package info (click to toggle)
snort 2.7.0-20.4
  • links: PTS
  • area: main
  • in suites: lenny
  • size: 34,512 kB
  • ctags: 18,772
  • sloc: ansic: 115,404; sh: 10,893; makefile: 1,372; perl: 487; sql: 213
file content (60 lines) | stat: -rw-r--r-- 1,193 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
Rule:

--
Sid:
1540

--
Summary:
This event is generated when an attempt is made to exploit a known 
vulnerability in a ColdFusion web server.

--
Impact:
Information gathering and system integrity compromise. Possible unauthorized
administrative access to the server or application. Possible execution
of arbitrary code of the attackers choosing in some cases. Denial of
Service is possible.

--
Detailed Information:
This event is generated when an attempt is made to compromise a host
running Coldfusion. Many known vulnerabilities exist for this platform and 
the attack scenarios are legion.

--
Affected Systems:
	All systems running ColdFusion

--
Attack Scenarios:
Many attack vectors are possible from simple directory traversal to
exploitation of buffer overflow conditions.

--
Ease of Attack:
Simple. Many exploits exist.

--
False Positives:
None known.

--
False Negatives:
None known.

--
Corrective Action:
Ensure the system is using an up to date version of the software and has
had all vendor supplied patches applied.

--
Contributors:
Sourcefire Research Team
Brian Caswell <bmc@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>

--
Additional References:

--