File: 2015.txt

package info (click to toggle)
snort 2.9.7.0-5
  • links: PTS, VCS
  • area: main
  • in suites: buster, sid, stretch
  • size: 55,000 kB
  • ctags: 38,464
  • sloc: ansic: 266,667; sh: 12,508; makefile: 2,908; yacc: 497; perl: 496; lex: 261; sed: 14
file content (76 lines) | stat: -rw-r--r-- 1,874 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
Rule:

--
Sid:
2015

--
Summary:
Remote Procedure Call (RPC) is a facility that enables a machine to 
request a service from another remote machine. This is done without the 
need for detailed network information. Some versions of RPC have a 
vulnerability that allows an a remote host to register (and un-register)
applications from a spoofed source.

--
Impact:
Possible denial of service (DoS) against the target host. Potential 
remote root compromise of the target system.

--
Detailed Information:
Certain versions of rpcbind portmapper contain a flaw that could allow 
an attacker capable of spoofing UDP packets to set and unset calls to 
arbitrary RPC programs.

A denial of service could be instigated against the target machine that 
could render network file system services and other such network 
available services unavailable to network users.

It is also possible for the attacker to gain super user access depending
on the RPC service he is able to register. This could then lead to a
compromise of all resources on the network the victim is attached to.

--
Affected Systems:
All machines running vulnerable RPC services.

--
Attack Scenarios:
The attacker could potentially spoof UDP packets for pmap_set to 
register an RPC service. The attacker might also spoof UDP packets to 
un-register needed services via pmap_unset.

--
Ease of Attack:
Simple

--
False Positives:
None Known

--
False Negatives:
None Known

--
Corrective Action:
RPC services should not be available outside the local area network, 
filter RPC ports at the firewall to ensure access is denied to RPC 
enabled machines.

RPC services should also be disabled where not needed.

--
Contributors:
Sourcefire Research Team
Brian Caswell <bmc@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>

--
Additional References:

BugTraq:
http://www.securityfocus.com/bid/1892

--