VRT Rules 2005-05-04
Sourcefire VRT Certified Rules Update
After continuing research into vulnerabilities in Oracle, Computer Associates License Application and the Mozilla web browser, the Sourcefire Vulnerability Research Team (VRT) has released a number of rules to detect attacks against vulnerabilities in these products.
An attacker can supply the Oracle XDB FTP service an overly long value to the FTP TEST subcommand. This can cause a buffer overflow, allowing an attacker to execute arbitrary code. An attacker must be authenticated to the FTP service in order to exploit this vulnerability.
Rules to detect attacks against this vulnerability are included in this rule pack and are identified as sids 3630 and 3631.
Computer Associates License software allows a site to maintain and handle licenses for CA products. A server runs the software to facilitate this and it communicates with clients/agents on the network. A vulnerability exists in the PUTOLF message that exchanges data with a listening server or client.
A rule to detect attacks against this vulnerability is included in this rule pack and is identified as sid 3637.
The Mozilla browser is vulnerable to an integer overflow when processing images in Bitmap (BMP) format. Programming errors may present an attacker with the opportunity to cause the integer overflow due to insufficient bounds checking in the code that handles bitmap images.
Rules to detect attacks against this vulnerbility are included in this rule pack and are identified as sids 3632 through 3634.
Rule Pack Summary:
For a complete list of new and modified rules, click here.
Sourcefire VRT rule packs often utilize enhancements made to Snort. Operators should upgrade to the latest revision or patch level for Snort to ensure these enhancements are available before using these rules.
About the VRT:
The Sourcefire VRT is a group of leading edge intrusion detection and prevention experts working to proactively discover, assess and respond to the latest trends in hacking activity, intrusion attempts and vulnerabilities. This team is also supported by the vast resources of the open source Snort community, making it the largest group dedicated to advances in network security industry.