File: 255.txt

package info (click to toggle)
snort 2.7.0-20.4
  • links: PTS
  • area: main
  • in suites: lenny
  • size: 34,512 kB
  • ctags: 18,772
  • sloc: ansic: 115,404; sh: 10,893; makefile: 1,372; perl: 487; sql: 213
file content (61 lines) | stat: -rw-r--r-- 1,147 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
Rule:
--
Sid:
255

--

Summary:
This event is generated when an attempt is made to request a zone 
transfer from a DNS Server

--
Impact:
Information disclosure.

--
Detailed Information:
DNS Zone transfers are normally used between DNS Servers to replicate 
zone information. Zone transfers can also be used to gain information 
about a network.

--
Affected Systems:
	All DNS Servers

--
Attack Scenarios:
A malicious user may request a Zone Transfer to gather information 
before commencing an attack.  This can give the user a list of hosts to 
target.

--
Ease of Attack:
Simple.

--
False Positives:
DNS Zone transfers may be part of normal traffic for DNS servers.

--
False Negatives:  
None known

--
Corrective Action:
Configure the DNS servers to only allow zone transfers from authorised 
hosts, limit the information available from publicly acessible DNS 
server by using Split Horizon DNS or separate DNS Servers for internal 
networks.

--
Contributors:
Original rule writer unknown
Original document author unkown
Sourcefire Vulnerability Research Team
Nigel Houghton <nigel.houghton@sourcefire.com>

--
Additional References:

--