Rule Category

SERVER-OTHER -- Snort has detected traffic exploiting vulnerabilities in a server in the network.

Alert Message

SERVER-OTHER Microsoft Frontpage /_vti_bin/ access

Rule Explanation

This event is generated when an attempt is made to exploit a known vulnerability in a web server running Microsoft FrontPage Server Extensions. Impact: Information gathering and system integrity compromise. Possible unauthorized administrative access to the server or application. Possible execution of arbitrary code of the attackers choosing in some cases. Denial of Service is possible. Details: This event is generated when an attempt is made to compromise a host running Microsoft FrontPage Server Extensions. Many known vulnerabilities exist for this platform and the attack scenarios are legion. In particular this rule generates events when the directory _vti_bin is accessed. This directory contains sensitive files that may be utilized in an attack against the server. Ease of Attack: Simple. Many exploits exist.

What To Look For

This rule will alert when an attempt to enumerate a Microsoft Frontpage directory is detected.

Known Usage

No public information

False Positives

Known false positives, with the described conditions

A user who is using the "discuss" toolbar in Microsoft Internet Explorer may inadvertently generate an event from this rule, due to the browser making a check for Office Server Extensions. See this URI for more details. http://www.webmasterworld.com/forum39/2158.htm

Contributors

Cisco Talos Brian Caswell Nigel Houghton

Rule Groups

No rule groups

CVE

None

Rule Vulnerability

No information provided

CVE Additional Information

This product uses data from the NVD API but is not endorsed or certified by the NVD.

None

MITRE ATT&CK Framework

Tactic: Collection

Technique: Automated Collection

For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org