File: 2670.txt

package info (click to toggle)
snort 2.7.0-20.4
  • links: PTS
  • area: main
  • in suites: lenny
  • size: 34,512 kB
  • ctags: 18,772
  • sloc: ansic: 115,404; sh: 10,893; makefile: 1,372; perl: 487; sql: 213
file content (58 lines) | stat: -rw-r--r-- 947 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
Rule: 

--
Sid: 
2670

-- 
Summary: 
This event is generated when an attempt is made to access the file
pgpmail.pl.

-- 
Impact: 
Possible unauthorized administrative access to the victim host.

--
Detailed Information:
The script pgpmail.pl does not properly sanitize user supplied input.
This may allow an attacker to supply commands of their choosing to the
victim host with the privileges of the user running the web server.

--
Affected Systems:
	pgpmail prior to and including 3.6

--
Attack Scenarios: 
An attacker can supply arbitrary commands to the pgpmail.pl script.

-- 
Ease of Attack: 
Simple

-- 
False Positives:
None Known

--
False Negatives:
None Known

-- 
Corrective Action: 
Uninstall the script pgpmail.pl

Only allow usage from authenticated users

--
Contributors: 
Sourcefire Vulnerability Research Team
Alex Kirk <alex.kirk@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>

-- 
Additional References:


--