1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61
|
SID:
295
--
Rule:
--
Summary:
This event is triggered when an attempt is made to overflow an imapd
server.
--
Impact:
Commands may be run on the IMAP server as the root user, This can lead
to a complete compromise of the targeted system
--
Detailed Information:
Failure to check the size of the value passed to the 'AUTHENTICATE'
command on certain IMAPD implementations can lead to a buffer overflow.
This in turn can allow arbitrary commands to be executed on the server.
--
Affected Systems:
Netscape Messaging Server 3.55
University of Washington imapd 10.234
--
Attack Scenarios:
An attacker may attempt to exploit a vulnerable imapd server, permitting
the execution of arbitrary commands possibly with the privilege of user
"root".
--
Ease of Attack:
simple. Sample exploit code is available.
--
False Positives:
None known
--
False Negatives:
None known
--
Corrective Action:
Vendors have provided updated versions, upgrading will resolve this
problem
--
Contributors:
Snort documentation contributed by matthew harvey <indexone@yahoo.com>
Original Rule Writer Unknown
Sourcefire Research Team
Nigel Houghton <nigel.houghton@sourcefire.com>
--
References:
--
|