File: 2079.txt

package info (click to toggle)
snort 2.9.7.0-5
  • links: PTS, VCS
  • area: main
  • in suites: buster, sid, stretch
  • size: 55,000 kB
  • ctags: 38,464
  • sloc: ansic: 266,667; sh: 12,508; makefile: 2,908; yacc: 497; perl: 496; lex: 261; sed: 14
file content (70 lines) | stat: -rw-r--r-- 1,279 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
Rule:

--
Sid:
2079

--
Summary:
number for the rpc service lockd.

--
Impact:
Intelligence gathering

--
Detailed Information:
This may be an attacker probing for vulnerable versions of rpc services.
In this case, the rpc service lockd.

If a user connects to port 1024 being used by the rpc service lockd, a 
denial of service can be issued by supplying random input to the 
service. This is an attempt to ascertain whether or not that attack 
could be successful.

--
Affected Systems:
	Debian Linux 2.1, 2.2 pre potato and 2.2
	MandrakeSoft Linux Mandrake 6.0, 6.1 and 7.0
	RedHat Linux 6.0 sparc, i386 and alpha
	RedHat Linux 6.1 sparc, i386 and alpha
	RedHat Linux 6.2 sparc, i386 and alpha

--
Attack Scenarios:
The attacker needs to send random data to port 1024 used by nlockmgr.

--
Ease of Attack:
Simple

--
False Positives:
None Known

--
False Negatives:
None Known

--
Corrective Action:
Apply the appropriate patches for the system.

Upgrade the software to the latest non vulnerable version.

--
Contributors:
Sourcefire Research Team
Brian Caswell <bmc@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>

--
Additional References:

Bugtraq:
http://www.securityfocus.com/bid/1372

CVE:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0508

--