File: 2086.txt

package info (click to toggle)
snort 2.7.0-20.4
  • links: PTS
  • area: main
  • in suites: lenny
  • size: 34,512 kB
  • ctags: 18,772
  • sloc: ansic: 115,404; sh: 10,893; makefile: 1,372; perl: 487; sql: 213
file content (85 lines) | stat: -rw-r--r-- 1,892 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
Rule:

--
Sid:
2086

--
Summary:
parse_xml.cgi script on a webserver via the quicktime streaming port.

--
Impact:
Arbitrary code execution, information disclosure and possible cross site
scripting.

--
Detailed Information:
Multiple vulnerabilities exist in Apple Quick Time Streaming Server and 
Apple Darwin Streamin Server, such that an attacker can gain information
on the file system as an intelligence gathering activity for an attack 
on vulnerable services.

It is also possible for an attacker to inject malicious code into the 
log file for the server, the impact of this would be to execute the code
when viewed by the administrator.

It is also directly vulnerable to cross site scripting issues.

--
Affected Systems:
	Apple Darwin Streaming Server 4.1.2
	Apple Quicktime Streaming Server 4.1.1

--
Attack Scenarios:
In the case of injecting code to the log files, the attacker would need 
to make requests to the streaming server with the code inserted in the 
request.

The attacker can execute an attack on the file system contents using a 
browser, the attacker needs to include a NULL byte in the request to 
reveal the directory structure.

The cross site scripting issue does not need anything specific to be 
done.

--
Ease of Attack:
Simple

--
False Positives:
None Known

--
False Negatives:
None Known

--
Corrective Action:
Apply the appropriate patches for the systems affected.

Upgrade to the latest non affected versions of the software.

--
Contributors:
Sourcefire Research Team
Brian Caswell <bmc@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>

--
Additional References:

Bugtraq:
http://www.securityfocus.com/bid/6960
http://www.securityfocus.com/bid/6990
http://www.securityfocus.com/bid/6955
http://www.securityfocus.com/bid/6956
http://www.securityfocus.com/bid/6958


CVE:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0054

--