File: 3129.txt

package info (click to toggle)
snort 2.9.7.0-5
  • links: PTS, VCS
  • area: main
  • in suites: bullseye, buster, sid, stretch
  • size: 55,000 kB
  • ctags: 38,464
  • sloc: ansic: 266,667; sh: 12,508; makefile: 2,908; yacc: 497; perl: 496; lex: 261; sed: 14
file content (69 lines) | stat: -rw-r--r-- 1,467 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
Rule: 

--
Sid: 
3129

-- 
Summary: 
This event is generated when an attempt is made to exploit a known
vulnerability in Microsoft License Logging Service.

-- 
Impact: 
Serious. Execution of arbitrary code leading to unauthorized
administrative access to the target host. Denial of Service (DoS) is
also possible.

--
Detailed Information:
Microsoft License Logging Service is used to manage licenses for
Microsoft server products.

A vulnerability in the service exists due to a programming error such
that an unchecked buffer may present an attacker with the opportunity to
exploit the service and run code of their choosing on an affected
system. The attacker may then cause a DoS condition in the service or
possibly gain administrative access to the target host.

The unchecked buffer exists when processing the length of messages sent
to the logging service.

--
Affected Systems:
	Microsoft Windows Server 2003
	Microsoft Windows Server 2000
	Microsoft Windows NT Server

--
Attack Scenarios: 
An attacker can supply extra data in the message to the service
containing code of their choosing to be run on the server.

-- 
Ease of Attack: 
Simple.

-- 
False Positives:
None known.

--
False Negatives:
None known.

-- 

Corrective Action: 
Apply the appropriate vendor supplied patches.

--
Contributors: 
Sourcefire Vulnerability Research Team
Brian Caswell <bmc@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>

-- 
Additional References:

--