1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78
|
Rule:
--
Sid:
2012
--
Summary:
CVS is the Concurrent Versions System, commonly used to
help manage software development.
--
Impact:
This may be an intelligence gathering activity or an attempt to connect
to CVS using the credentials of a user with escalated privileges. Should
this attempt be succesful the entire CVS repository may be compromised.
--
Detailed Information:
This rule detects attempts to connect to a CVS repository that fail due
determined activity by an attacker to gain unauthorized access to the
CVS respository.
The source code of software in the repository may be compromised by a
succesful attacker who could choose to insert malicious code of his own
making.
For CVS daemons running under changed root conditions (chroot), the rest
of the operating system files may be protected but the entire CVS
directory structure and contents is vulnerable.
--
Affected Systems:
All versions of CVS
--
Attack Scenarios:
This may be an intelligence gathering activity or an attempt to log in
to CVS using the credentials of an authorized user.
--
Ease of Attack:
Simple.
--
False Positives:
It is possible that the cvsroot on the server is misconfigured. Check
permissions on the cvsroot to ensure the repository is writable by the
cvsdaemon.
--
False Negatives:
Connections to the server using zlib compression will not generate this
event.
--
Corrective Action:
Disable the CVS daemon in the file /etc/inetd.conf. Run the CVS daemon
as a user other than root that does not have a valid login to the
machine.
Disable anonymous cvs access to the server where appropriate.
Maintain checks on the password database and the CVS repository.
--
Contributors:
Sourcefire Research Team
Brian Caswell <bmc@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>
--
Additional References:
CVS:
http://www.cvshome.org/docs/
--
|