File: 2394.txt

package info (click to toggle)
snort 2.7.0-20.4
  • links: PTS
  • area: main
  • in suites: lenny
  • size: 34,512 kB
  • ctags: 18,772
  • sloc: ansic: 115,404; sh: 10,893; makefile: 1,372; perl: 487; sql: 213
file content (57 lines) | stat: -rw-r--r-- 1,471 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
Rule:

--
Sid:
2394

--
Summary:
This event is generated when a malformed request is sent to the Compaq Web-Based Management Agent.

--
Impact:
Denial of service.

--
Detailed Information:
Compaq Web-Based Management Agent is used to perform remote system administration for Windows hosts.  A vulnerability exists in the software when traffic is sent t
o access to Compaq Web-Based Management Agent that contains a malformed request, possibly causing the service to crash.  URL requests that contain the characters "
<!>" or "<!" followed by arguments followed by ">" cause the denial of service to occur.  Note that the rule uses an initial keyword of "content" instead of "urico
ntent" since uricontent only examines web server ports identified in the pre-processor http_inspect in the configuration setup.  Default configurations do not incl
ude port 2301 as a web server port, preventing the event from being generated.

--
Affected Systems:
Host running Compaq Web-Based Management Agent.

--
Attack Scenarios:
An attacker can send a malformed request to the listening service, causing the system to crash.

--
Ease of Attack:
Simple.

--
False Positives:
None Known.

--
False Negatives:
None Known.

--
Corrective Action:
Block inbound port 2301 traffic or restrict access to known authorized IP addresses.

--
Contributors:
Sourcefire Research Team
Judy Novak <judy.novak@sourcefire.com>

Additional References:

bugtraq
http://www.securityfocus.com/bid/8014

--