File: 1227.txt

package info (click to toggle)
snort 2.9.7.0-5
  • links: PTS, VCS
  • area: main
  • in suites: bullseye, sid
  • size: 55,000 kB
  • ctags: 38,464
  • sloc: ansic: 266,667; sh: 12,508; makefile: 2,908; yacc: 497; perl: 496; lex: 261; sed: 14
file content (55 lines) | stat: -rw-r--r-- 1,688 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
Rule:

--
Sid:
1227

--
Summary:
This event is generated when an attempt is made to communicate to an internal host from a remote X server session.

--
Impact:
Remote access.  This attack may indicate that an internal host has been compromised and has been configured to offer remote access through an xterm session.

--
Detailed Information:
Traffic from source ports 6000 through 6005 inclusive may indicate that an internal host is communicating with an external host using an xterm session.  An attacker may compromise an internal host and establish communications between the remote host and the compromised host using an xterm session.  This is particularly effective means of establishing communications because the xterm session is established by the internal host.  Typically, firewalls do not scrutinize or block outbound traffic, such as establishing an xterm session. 

--
Affected Systems:
Host offering xterm client software. 

--
Attack Scenarios:
An attacker may establish communications using an xterm session between a compromised host and remote host.

--
Ease of Attack:
Simple.

--
False Positives:
A remote host may connect to an internal host with a source port of 6000 through 6005 inclusive.

--
False Negatives:
If multiple concurrent xterm sessions exists, a port greater than 6005 may be selected.

--
Corrective Action:
Block outbound xterm sessions.

--
Contributors:
Original rule written by Max Vision <vision@whitehats.com>
Documented by  Steven Alexander<alexander.s@mccd.edu>
Modified by Brian Caswell <bmc@sourcefire.com>
Sourcefire Research Team
Judy Novak <judy.novak@sourcefire.com>


Additional References:
http://www.whitehats.com/info/IDS126

--