File: 2381.txt

package info (click to toggle)
snort 2.8.5.2-8
  • links: PTS
  • area: main
  • in suites: squeeze
  • size: 37,692 kB
  • ctags: 25,758
  • sloc: ansic: 177,775; sh: 11,401; makefile: 1,994; yacc: 495; perl: 491; lex: 252; sql: 213
file content (65 lines) | stat: -rw-r--r-- 1,353 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
Rule:  

--
Sid:
2381

--
Summary:
This event is generated when an attempt is made to exploit a known
vulnerability in Checkpoint Firewall-1

--
Impact:
Serious. Unauthorized administrative access to the firewall

--
Detailed Information:
A vulnerability exists in Checkpoint Firewall-1 that may allow a remote
attacker to gain control of the firewall. The issues lies in the
handling of HTTP requests by the Security Server and Application
Intelligence modules of the Firewall's administration console.

By supplying a malformed scheme in a URI an attacker may present the
attacker with the opportunity to send data of their choosing to the
sprintf() system call.

--
Affected Systems:
	Checkpoint Firewall-1
	
--
Attack Scenarios:
An attacker must supply specially crafted packets containing malformed
URI schema with the data they wish to send to the sprintf() function.
This may then present the attacker with administrative privileges on the
server.

--
Ease of Attack:
Moderate.

--
False Positives:
None known

--
False Negatives:
None known

--
Corrective Action:
Disallow external access to the Firewall-1 administrative interface.

Disable the Web interface to the firewall if possible

--
Contributors:
Sourcefire Research Team
Brian Caswell <bmc@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>

-- 
Additional References:

--