File: 2255.txt

package info (click to toggle)
snort 2.7.0-20.4
  • links: PTS
  • area: main
  • in suites: lenny
  • size: 34,512 kB
  • ctags: 18,772
  • sloc: ansic: 115,404; sh: 10,893; makefile: 1,372; perl: 487; sql: 213
file content (65 lines) | stat: -rw-r--r-- 1,358 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
Rule:

--
Sid:
2255

--
Summary:
This event is generated when an attempt is made to exploit a known
vulnerability associated with the Remote Procedure Call (RPC) sadmind.

--
Impact:
Remote root access.  This attack may permit execution of arbitrary commands with the privileges of root.

--
Detailed Information:
The sadmind RPC service is used by Solaris Solstice AdminSuite 
applications to perform remote distributed system administration tasks 
such as adding new users.  

This event indicates that an RPC query for the sadmind service has been
made with the credentials of the root user supplied.

This may permit execution of arbitrary commands with the privileges of root.

--
Affected Systems:
All systems using sadmind

--
Attack Scenarios:
Exploit code can be used to attack a vulnerable sadmind to obtain root access to the remote host.

--
Ease of Attack:
Simple.  Exploit scripts are freely available. 

--
False Positives:
None Known.

--
False Negatives:
None Known.

--
Corrective Action:
Limit remote access to RPC services.

Filter RPC ports at the firewall to ensure access is denied to RPC-enabled machines. 

Disable unneeded RPC services.

--
Contributors:
Sourcefire Research Team
Brian Caswell <bmc@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>
Judy Novak <judy.novak@sourcefire.com>

--
Additional References:

--