File: 279.txt

package info (click to toggle)
snort 2.7.0-20.4
  • links: PTS
  • area: main
  • in suites: lenny
  • size: 34,512 kB
  • ctags: 18,772
  • sloc: ansic: 115,404; sh: 10,893; makefile: 1,372; perl: 487; sql: 213
file content (59 lines) | stat: -rw-r--r-- 1,222 bytes parent folder | download | duplicates (4)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
Rule:  

--
Sid:
279

--
Summary:
This event is generated when an attempt is made to issue a Denial of 
Service attack that causes Bay/Nortel Nautical Marlin bridges to crash.

--
Impact:
Denial of Service. Network traffic can be disrupted.

--
Detailed Information:
Nautica Marlin bridges will crash if a UDP packet is received on the 
SNMP port (161) which has a data length of 0.

--
Affected Systems:
	Bay/Nortel Nautica Marlin Bridges

--
Attack Scenarios:
The bridges can be crashed remotely.  The offending packet uses UDP 
(which is not connection oriented) and can be easily spoofed. 

--
Ease of Attack:
Simple.  Tools are available that can exploit this vulnerability.

--
False Positives:
None known.

--
False Negatives:
None known.

--
Corrective Action:
Block connections to port 161 from unauthorized hosts using firewall or 
router ACLs.  The release notes for the only available upgrade for this 
product do not mention this vulnerability.  The product has been 
discontinued.  

--
Contributors:
Original Rule Writer Unknown
Sourcefire Research Team
Nigel Houghton <nigel.houghton@sourcefire.com>
Snort documentation contributed by Steven Alexander<alexander.s@mccd.edu>

-- 
Additional References:

--