File: 1751.txt

package info (click to toggle)
snort 2.7.0-20.4
  • links: PTS
  • area: main
  • in suites: lenny
  • size: 34,512 kB
  • ctags: 18,772
  • sloc: ansic: 115,404; sh: 10,893; makefile: 1,372; perl: 487; sql: 213
file content (67 lines) | stat: -rw-r--r-- 1,192 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
Rule:

--
Sid: 1751

--
Summary:
This event is generated when a buffer overflow attempt is made against a host using cachefsd.

--
Impact:
Serious. System compromize presenting the attacker with the opportunity to execute arbitrary code or gain remote access to the victim host.

--
Detailed Information:
A buffer overflow condition exists in the Cache File System daemon 
(cachefsd) on certain versions of Solaris for SPARC and x86 
architectures.

cachefsd is used to improve the performance of NFS servers.

Affected Systems:
	Solaris 5.5.1, 5.6, 5.7 and 5.8

--
Attack Scenarios:
Exploit scripts are available

--
Ease of Attack:
Simple. Exploits are available.

--
False Positives:
None Known

--
False Negatives:
None Known

--
Corrective Action:
Upgrade to the latest non-affected version of the software.

Disable cachefsd.

--
Contributors:
Original rule writer unknown
Sourcefire Research Team
Nigel Houghton <nigel.houghton@sourcefire.com>

--
Additional References:

AusCERT:
http://www.auscert.org.au/render.html?it=1918

CERT:
http://www.kb.cert.org/vuls/id/161931
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0084


Bugtraq:
http://www.securityfocus.com/bid/4631

--