« Back
May 2005 Archive
Sourcefire VRT Certified Rules Update
Date: 2005-05-31
Synopsis:
The Sourcefire Vulnerability Research Team (VRT) has learned of serious vulnerabilities affecting MySQL and Ethereal. The VRT has also completed work to normalize older rules to improve the detection capabilities of the Snort engine.
Details:
There are two vulnerabilities associated with MySQL password authentication. The first vulnerability may permit an unauthorized user access to the server if the attacker knows an authorized username and crafts a malicious client password hash. The second vulnerability may cause a denial of service or buffer overflow if an attacker knows an authorized username and crafts an overly long password hash.
Rules to detect attacks against this vulnerability are included in this rule pack and are identified as sids 3665 and 3672.
An error in the processing of tcp packets in a SIP protocol transaction may lead to a Denial of Service (DoS) condition in Ethereal. The SIP parsing routine does not properly check the length of data supplied to a fixed length buffer in the processing of the SIP data.
Rules to detect attacks against this vulnerbility are included in this rule pack and are identified as sids 3677 and 3678.
Rule Pack Summary:
For a complete list of new and modified rules, click here.
Warning:
Sourcefire VRT rule packs often utilize enhancements made to Snort. Operators should upgrade to the latest revision or patch level for Snort to ensure these enhancements are available before using these rules.
About the VRT:
The Sourcefire VRT is a group of leading edge intrusion detection and
prevention experts working to proactively discover, assess and respond
to the latest trends in hacking activity, intrusion attempts and
vulnerabilities. This team is also supported by the vast resources of
the open source Snort community, making it the largest group dedicated
to advances in network security industry.
Posted by on May 31, 2005
Sourcefire VRT Certified Rules Update
Date: 2005-05-18
Synopsis:
After continuing research into vulnerabilities affecting BrightStor
ARCserve Backup Universal Agent and the CVS daemon, the Sourcefire
Vulnerability Research Team (VRT) has released a number of rules to
detect attacks against vulnerabilities in these products.
Details:
A vulnerability exists in the way that a the BrightStor ARCserve Backup
Universal Agent processes messages with overly long data. The Universal
Agent software of the ARCserve Backup suite is used to push backups from
individual hosts to the server component. A message with a combination
of specific option types, length value ranges and overly long data sent
to a Universal Agent listener can cause a buffer overflow and the
subsequent execution of arbitrary code with system level privileges on a
vulnerable server.
Rules to detect this vulnerability are included in this rule pack and
are identified as sids 3658 through 3663.
CVS is the Concurrent Versions System, commonly used to help manage
software development. A user with branching privileges can exploit a
vulnerability associated with the cvs annotate command to cause a buffer
overflow to occur.
Rules to detect this vulnerability are included in this rule pack and
are identified as sids 3651 through 3652.
Rule Pack Summary:
For a complete list of new and modified rules, click here.
Warning:
Sourcefire VRT rule packs often utilize enhancements made to Snort. Operators should
upgrade to the latest revision or patch level for Snort to ensure these enhancements are
available before using these rules.
About the VRT:
The Sourcefire VRT is a group of leading edge intrusion detection and
prevention experts working to proactively discover, assess and respond
to the latest trends in hacking activity, intrusion attempts and
vulnerabilities. This team is also supported by the vast resources of
the open source Snort community, making it the largest group dedicated
to advances in network security industry.
Posted by on May 18, 2005
Sourcefire VRT Certified Rules Update
Date: 2005-05-04
Synopsis:
After continuing research into vulnerabilities in Oracle, Computer
Associates License Application and the Mozilla web browser, the
Sourcefire Vulnerability Research Team (VRT) has released a number of
rules to detect attacks against vulnerabilities in these products.
Details:
An attacker can supply the Oracle XDB FTP service an overly long
value to the FTP TEST subcommand. This can cause a buffer overflow,
allowing an attacker to execute arbitrary code. An attacker must
be authenticated to the FTP service in order to exploit this
vulnerability.
Rules to detect attacks against this vulnerability are included in this
rule pack and are identified as sids 3630 and 3631.
Computer Associates License software allows a site to maintain and
handle licenses for CA products. A server runs the software to
facilitate this and it communicates with clients/agents on the
network. A vulnerability exists in the PUTOLF message that exchanges
data with a listening server or client.
A rule to detect attacks against this vulnerability is included in this
rule pack and is identified as sid 3637.
The Mozilla browser is vulnerable to an integer overflow when processing
images in Bitmap (BMP) format. Programming errors may present an
attacker with the opportunity to cause the integer overflow due to
insufficient bounds checking in the code that handles bitmap images.
Rules to detect attacks against this vulnerbility are included in this
rule pack and are identified as sids 3632 through 3634.
Rule Pack Summary:
For a complete list of new and modified rules,
click here.
Warning:
Sourcefire VRT rule packs often utilize enhancements made to Snort. Operators should
upgrade to the latest revision or patch level for Snort to ensure these enhancements are
available before using these rules.
About the VRT:
The Sourcefire VRT is a group of leading edge intrusion detection and
prevention experts working to proactively discover, assess and respond
to the latest trends in hacking activity, intrusion attempts and
vulnerabilities. This team is also supported by the vast resources of
the open source Snort community, making it the largest group dedicated
to advances in network security industry.
Posted by on May 04, 2005