File: 2584.txt

package info (click to toggle)
snort 2.7.0-20.4
  • links: PTS
  • area: main
  • in suites: lenny
  • size: 34,512 kB
  • ctags: 18,772
  • sloc: ansic: 115,404; sh: 10,893; makefile: 1,372; perl: 487; sql: 213
file content (64 lines) | stat: -rw-r--r-- 1,398 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
Rule:

--
Sid:
1102

--
Summary:
This event is generated when an attempt is made to exploit a known 
vulnerability in the peer to peer (p2p) client eMule.

--
Impact:
Possible execution of arbitrary code of the attackers choosing.

--
Detailed Information:
This event is generated when an attempt is made to exploit a known
vulnerability in the p2p application eMule. The eMule client is prone to
a buffer overflow condition which may present an attacker with the
opportunity to execute code of their choosing on a vulnerable host.

The issue surrounds the IRC module and the Web server portions of the
client. Sufficient bounds checking of user supplied data is not
correctly implemented causing the opportunity to overflow a buffer.

--
Affected Systems:
	All systems using eMule.

--
Attack Scenarios:
An attacker can supply overly long data in an IRC session between two
clients to trigger the overflow.

--
Ease of Attack:
Simple. Exploits exist.

--
False Positives:
None known.

--
False Negatives:
None known.

--
Corrective Action:
Ensure the system is using an up to date version of the software and has
had all vendor supplied patches applied.

Check the host logfiles and application logs for signs of compromise.

--
Contributors:
Sourcefire Vulnerability Research Team
Alex Kirk <alex.kirk@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>

--
Additional References:

--