File: 3086.txt

package info (click to toggle)
snort 2.9.7.0-5
  • links: PTS, VCS
  • area: main
  • in suites: buster, sid, stretch
  • size: 55,000 kB
  • ctags: 38,464
  • sloc: ansic: 266,667; sh: 12,508; makefile: 2,908; yacc: 497; perl: 496; lex: 261; sed: 14
file content (65 lines) | stat: -rw-r--r-- 1,413 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
Rule: 

--
Sid: 
3086

-- 
Summary: 
This event is generated when an attempt is made to access the file
spp_sta.stm on a 3com wireless router.

-- 

Impact: 
Intelligence gathering activity.

--
Detailed Information:
The 3Com ADSL wireless router 3CRADSL72 is prone to an authentication
bypass issue that may allow a malicious third party to gain information
on the device and the networks it serves. It may also be possible for an
attacker to gain administrative privileges on the device.

--
Affected Systems:
	3Com 3CRADSL72 ADSL wireless router

--

Attack Scenarios: 
An attacker with access to the page can gain information on the networks
being served by the router and use the knowledge gained in further
attacks on the system. The attacker may also be able to gain
administrative access to the router.

-- 
Ease of Attack: 
Simple. No exploit software is required.

-- 
False Positives:
None Known.

--
False Negatives:
The address of the router should be added to the $HTTP_SERVERS variable
if the rule is used in the default form. Otherwise a $WIRELESS_ROUTERS
variable could be used in both the snort.conf and the rule to eliminate
any possible false positives.

-- 
Corrective Action: 
Apply the appropriate vendor supplied patch.

--
Contributors: 
Sourcefire Research Team
Matt Watchinski <mwatchinski@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>

-- 
Additional References:


--