VRT Advisories

VRT Rules 2005-05-18

Sourcefire VRT Certified Rules Update

Date: 2005-05-18


After continuing research into vulnerabilities affecting BrightStor ARCserve Backup Universal Agent and the CVS daemon, the Sourcefire Vulnerability Research Team (VRT) has released a number of rules to detect attacks against vulnerabilities in these products.


A vulnerability exists in the way that a the BrightStor ARCserve Backup Universal Agent processes messages with overly long data. The Universal Agent software of the ARCserve Backup suite is used to push backups from individual hosts to the server component. A message with a combination of specific option types, length value ranges and overly long data sent to a Universal Agent listener can cause a buffer overflow and the subsequent execution of arbitrary code with system level privileges on a vulnerable server.

Rules to detect this vulnerability are included in this rule pack and are identified as sids 3658 through 3663.

CVS is the Concurrent Versions System, commonly used to help manage software development. A user with branching privileges can exploit a vulnerability associated with the cvs annotate command to cause a buffer overflow to occur.

Rules to detect this vulnerability are included in this rule pack and are identified as sids 3651 through 3652.

Rule Pack Summary:

For a complete list of new and modified rules, click here.


Sourcefire VRT rule packs often utilize enhancements made to Snort. Operators should upgrade to the latest revision or patch level for Snort to ensure these enhancements are available before using these rules.

About the VRT:

The Sourcefire VRT is a group of leading edge intrusion detection and prevention experts working to proactively discover, assess and respond to the latest trends in hacking activity, intrusion attempts and vulnerabilities. This team is also supported by the vast resources of the open source Snort community, making it the largest group dedicated to advances in network security industry.