File: 3193.txt

package info (click to toggle)
snort 2.9.15.1-5
  • links: PTS, VCS
  • area: main
  • in suites: bullseye
  • size: 59,656 kB
  • sloc: ansic: 310,441; sh: 13,260; makefile: 2,943; yacc: 497; perl: 496; lex: 261; sed: 14
file content (66 lines) | stat: -rw-r--r-- 1,411 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
Rule:

--
Sid:
3193

--
Summary:
This event is generated when an attempt is made to exploit a known
vulnerability in Microsoft Internet Information Server.

--
Impact:
Serious. Code execution leading to unauthorized administrative access
on the target host.

--
Detailed Information:
Microsoft IIS contains a programming error that may allow an attacker to
execute commands of their choosing on a vulnerable system. If a valid
request for an executable file on the system is made, the server will
honor the request and execute any commands sent to the system. It may be
possible for an attacker to execute system commands sent to cmd.exe or
an executable batch file (.bat) for example.

--
Affected Systems:
	Microsoft IIS 4.0
	Microsoft IIS 5.0

--
Attack Scenarios:
An attacker can send a request to an executable file on the system and
supply command arguments of their choice to the file. The server will
honor the request and execute the attackers commands.

For example, http://www.target.com/scripts/cmd.bat"+&+somecommand

--
Ease of Attack:
Simple.

--
False Positives:
None known.

--
False Negatives:
None known.

--
Corrective Action:
Upgrade to the latest non-affected version of the software.

Apply the appropriate vendor supplied patches.

--
Contributors:
Sourcefire Research Team
Brian Caswell <bmc@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>

--
Additional References:

--