File: 1748.txt

package info (click to toggle)
snort 2.9.7.0-5
  • links: PTS, VCS
  • area: main
  • in suites: buster, stretch
  • size: 55,000 kB
  • ctags: 38,464
  • sloc: ansic: 266,667; sh: 12,508; makefile: 2,908; yacc: 497; perl: 496; lex: 261; sed: 14
file content (75 lines) | stat: -rw-r--r-- 2,038 bytes parent folder | download | duplicates (8)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
Rule:

--
Sid:
1748

--
Summary:
This event is generated when an attempt is made to send an overly long 
FTP command, possibly with the intent to cause of denial of service or 
buffer overflow in the 3CDaemon FTP server.

--
Impact:
Attempted remote access or denial of service.  Successful execution of 
this attack can cause a denial of service or buffer overflow, allowing 
the execution of arbitrary commands on the vulnerable FTP server.

--
Detailed Information:
3CDaemon is an FTP server for Windows hosts.  A buffer overflow 
vulnerability exists in 3CDaemon revision 10.  The exploit is caused by 
sending an FTP command that is 400 bytes or longer, causing the server 
to crash or permitting a buffer overflow that may allow the execution of
arbitrary commands with the privileges of the process running the FTP 
server.  This attack does not require login access to the FTP server.

--
Affected Systems:

	3Com 3CDaemon 2.0 revision 10

--
Attack Scenarios:
An attacker may attempt to exploit this vulnerability by sending and 
overly long FTP command, permitting the execution of arbitrary commands 
or causing a denial of service against the vulnerable server.

--
Ease of Attack:
Simple.  Exploit code is freely available. 

--
False Positives:
This rule may generate an event if an FTP client provides a legitimate 
request which is over 100 characters long. For example, when FTP clients
store or request files with full path located in deep directory 
hierarchies the full request might result in a filename that exceedes 95
characters.

This rule may also generate an event if Kerberos authentication is used
for the FTP server.

--
False Negatives:
None Known.

--
Corrective Action:
Upgrade to the latest non-affected version of the software or apply the appropriate patch.

--
Contributors:
Sourcefire Research Team
Brian Caswell <bmc@sourcefire.com> 
Nigel Houghton <nigel.houghton@sourcefire.com>
Judy Novak <judy.novak@sourcefire.com>

--
Additional References:

Bugtraq:
http://www.securityfocus.com/bid/4638

--