File: 1759.txt

package info (click to toggle)
snort 2.7.0-20.4
  • links: PTS
  • area: main
  • in suites: lenny
  • size: 34,512 kB
  • ctags: 18,772
  • sloc: ansic: 115,404; sh: 10,893; makefile: 1,372; perl: 487; sql: 213
file content (80 lines) | stat: -rw-r--r-- 1,755 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
Rule:  

--
Sid: 
1759

-- 

Summary: 
This event is generated when a command is issued to an SQL database
server that may result in a serious compromise of the data stored on
that system.

-- 
Impact: 
Serious. An attacker may have gained administrator access to the system.

--
Detailed Information:
This event is generated when an attacker issues a special command to an
SQL database that may result in a serious compromise of all data stored
on that system.

Such commands may be used to gain access to a system with the privileges
of an administrator, delete data, add data, add users, delete users,
return sensitive information or gain intelligence on the server software
for further system compromise.
 
This connection can either be a legitimate telnet connection or the
result of spawning a remote shell as a consequence of a successful
network exploit. 

--
Affected Systems:
	Microsoft SQL Servers

--

Attack Scenarios: 
Simple. These are SQL database commands.

-- 

Ease of Attack: 
Simple.

-- 

False Positives: 
This event may be generated by a database administrator logging in and
issuing database commands from a location outside the protected network.

--
False Negatives:
None Known

-- 

Corrective Action: 
Disallow direct access to the SQL server from sources external to the
protected network.

Ensure that this event was not generated by a legitimate session then
investigate the server for signs of compromise

Look for other events generated by the same IP addresses.

--
Contributors: 
Sourcefire Vulnerability Research Team
Brian Caswell <bmc@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>

-- 
Additional References:

Microsoft MSDN:
http://msdn.microsoft.com/library/en-us/tsqlref/ts_xp_aa-sz_4jxo.asp

--