File: 1504.txt

package info (click to toggle)
snort 2.9.7.0-5
  • links: PTS, VCS
  • area: main
  • in suites: buster, sid, stretch
  • size: 55,000 kB
  • ctags: 38,464
  • sloc: ansic: 266,667; sh: 12,508; makefile: 2,908; yacc: 497; perl: 496; lex: 261; sed: 14
file content (53 lines) | stat: -rw-r--r-- 1,181 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
Rule:  

--
Sid:
1504

--
Summary:
This event is generated when an attempt is made to access AFS from a source outside the protected network.

--
Impact:
Serious. Unauthorized file access.

--
Detailed Information:
The Andrew File System (AFS) is a popular networked file system much like NFS, it is often used in the enterprise or by educational institutions. 

AFS utilises an Access Control List (ACL) to determine which hosts or networks are allowed to connect to the resources in the system. Misconfigured ACLs may allow an attacker to gain critical information.

--
Attack Scenarios:
Badly configured ACL's allow an attacker that has access to the AFS service to read critical files and even upload files.

--
Ease of Attack:
Simple. No exploit code is needed.

--
False Positives:
None known

--
False Negatives:
None known

--
Corrective Action:
Use a packet filtering firewall to prevent unknown hosts from accessing the AFS service

--
Contributors:
Snort documentation contributed by Ueli Kistler, <u.kistler@engagesecurity.com>
Sourcefire Research Team
Brian Caswell <bmc@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>


-- 
Additional References:


--