File: 2013.txt

package info (click to toggle)
snort 2.7.0-20.4
  • links: PTS
  • area: main
  • in suites: lenny
  • size: 34,512 kB
  • ctags: 18,772
  • sloc: ansic: 115,404; sh: 10,893; makefile: 1,372; perl: 487; sql: 213
file content (72 lines) | stat: -rw-r--r-- 1,564 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
Rule:

--
Sid:
2013

--
Summary:
CVS is the Concurrent Versions System, commonly used to 
help manage software development.

--
Impact:
This may be an intelligence gathering activity or an attempt to view a 
module the user does not have access to. Should this attempt be 
succesful the entire CVS repository may be compromised.

--
Detailed Information:
This rule detects attempts to connect to a CVS repository that fail due 
indicate determined activity by an attacker to gain unauthorized access 
to the CVS respository.

The source code of software in the repository may be compromised by a 
succesful attacker who could choose to insert malicious code of his own 
making.

--
Affected Systems:
	All versions of CVS
	
--
Attack Scenarios:
This may be an intelligence gathering activity or an attempt to view a
module the user may not have access to.

--
Ease of Attack:
Simple.

--
False Positives:
It is possible that an authorized user may mis-type the module name.

--
False Negatives:
Connections to the server using zlib compression will not generate this
event.

--
Corrective Action:
Disable the CVS daemon in the file /etc/inetd.conf. Run the CVS daemon 
as a user other than root that does not have a valid login to the 
machine.

Disable anonymous cvs access to the server where appropriate.

Maintain checks on the password database and the CVS repository.

--
Contributors:
Sourcefire Research Team
Brian Caswell <bmc@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>

--
Additional References:

CVS:
http://www.cvshome.org/docs/

--