File: 2063.txt

package info (click to toggle)
snort 2.7.0-20.4
  • links: PTS
  • area: main
  • in suites: lenny
  • size: 34,512 kB
  • ctags: 18,772
  • sloc: ansic: 115,404; sh: 10,893; makefile: 1,372; perl: 487; sql: 213
file content (72 lines) | stat: -rw-r--r-- 1,496 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
Rule:

--
Sid:
2063

--
Summary:
This event is generated when an attempt is made to exploit a known 
vulnerability in Demarc PureSecure.

--
Impact:
Administrative control of the Demarc PureSecure IDS, Information 
disclosure

--
Detailed Information:
Demarc PureSecure is a Snort based Intrusion Detection System. A 
vulnerability exists where an attacker can bypass login authorization 
using SQL injection.

Versions of Demarc PureSecure up to 1.6 suffer from poor authentication 
methods, where input in the form of specially constructed SQL queries 
can allow an attacker to gain administrative access to the IDS.

--
Affected Systems:
Demarc PureSecure prior to version 1.6

--
Attack Scenarios:
The attacker needs to send specially constructed SQL queries directly to
the Demarc login page.

For example, the attacker might send his own variables for the session 
id or session key in a query s_key=' OR current_session_id LIKE '%' the 
attacker would of course, need to convert spaces to their encoded 
equivalents and escape special characters.

--
Ease of Attack:
Simple

--
False Positives:
None Known

--
False Negatives:
None Known

--
Corrective Action:
Upgrade to the latest non-affected version of the software.

--
Contributors:
Sourcefire Research Team
Brian Caswell <bmc@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>

--
Additional References:

Bugtraq
http://www.securityfocus.com/bid/4520

CVE
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0539

--