File: 2597.txt

package info (click to toggle)
snort 2.9.7.0-5
  • links: PTS, VCS
  • area: main
  • in suites: buster, sid, stretch
  • size: 55,000 kB
  • ctags: 38,464
  • sloc: ansic: 266,667; sh: 12,508; makefile: 2,908; yacc: 497; perl: 496; lex: 261; sed: 14
file content (68 lines) | stat: -rw-r--r-- 1,298 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
Rule:

--
Sid:
2597

--
Summary:
This event is generated when an attempt is made to exploit a buffer
overrun condition in the Samba Web Administration Tool (SWAT).

--
Impact:
Remote execution of arbitrary code.

--
Detailed Information:
A vulnerability exists in SWAT that may present an attacker with the
opportunity to execute code of their choosing on an affected host.

The problem lies in the functions that handle base64 decoding
during HTTP basic authentication. Exploitation of this vulnerability
may present the attacker with the opportunity to gain control of the
affected system.

--
Affected Systems:
	 Versions of Samba greater than or equal to 3.0.2 and
     less than 3.0.5

--
Attack Scenarios:
An attcker needs to make a specially crafted request to the SWAT
service that could contain harmful code to gain further access to the
system.

--
Ease of Attack:
Simple

--
False Positives:
None known.

--
False Negatives:
None known.

--
Corrective Action:
Apply the appropriate vendor supplied patches

--
Contributors:
Sourcefire Research Team
Matt Watchinski <mwatchinski@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>

--
Additional References:

CVE:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0600

Bugtraq:
http://www.securityfocus.com/bid/10780

--