File: 2329.txt

package info (click to toggle)
snort 2.7.0-20.4
  • links: PTS
  • area: main
  • in suites: lenny
  • size: 34,512 kB
  • ctags: 18,772
  • sloc: ansic: 115,404; sh: 10,893; makefile: 1,372; perl: 487; sql: 213
file content (78 lines) | stat: -rw-r--r-- 1,895 bytes parent folder | download | duplicates (4)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
Rule:

--
Sid:
2329

--
Summary:
This event is generated when an attempt is made to exploit a known
vulnerability in Microsoft Windows Data Access Components.

--
Impact:
Serious. Execution of arbitrary code is possible. Denial of Service
(DoS)

--
Detailed Information:
It may be possible for an attacker to send a specially crafted response
to a client broadcast query searching for an SQL server. This response
could take advantage of a buffer overrun condition in an MDAC component
which may result in the attacker being presented with the opportunity to 
execute code of their choosing with the privileges of the user running
the service on the client system.

A DoS condition may also manifest in MDAC version 2.8.

MDAC is included by default on many Microsoft Windows systems. Client
workstations may make regular broadcast announcements in an attempt to
find SQL servers.

--
Affected Systems:
	Microsoft Data Access Components 2.5
	Microsoft Data Access Components 2.6
	Microsoft Data Access Components 2.7
	Microsoft Data Access Components 2.8

--
Attack Scenarios:
The attacker may spoof the response from an SQL server to exploit the
vulnerability.

--
Ease of Attack:
Moderate..

--
False Positives:
Since this rule cannot be constrained using ports and the connection
state for MSDAC is not tracked, false positive events may occur under
normal circumstances. The $SQL_SERVERS variable in snort.conf should be
configured correctly to eliminate this behavior.

--
False Negatives:
None known

--
Corrective Action:
Apply the appropriate vendor supplied patches and service packs.

Disallow access to database servers from sources external to the
protected network.

Disallow access to database servers from untrusted hosts.

--
Contributors:
Sourcefire Research Team
Brian Caswell <bmc@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>

--
Additional References:


--