[Snort-sigs] rule documentation for MISC xfs overflow attempt

Josh.Sakofsky at ...1573... Josh.Sakofsky at ...1573...
Fri Jun 6 12:07:41 EDT 2003

Rule: MISC xfs overflow attempt

Sid: 1987

Summary: A remote user has attempted to exploit a flaw in the X Windows 
Font Service.

Impact: Serious

Detailed Information: Certain versions of XFS distributed with Sun's 
Solaris are vulnerable to a remote buffer overflow.
The Dispatch() routine within fs.auto does not provide adequate 

Affected Systems: Sun Solaris 2.5.1 to 9 (Update 2)
Attack Scenarios: An attacker must have access to tcp port 7100. The 
attacker can then either cause XFS to crash or run code as
user "nobody".

Ease of Attack: Difficult

False Positives: None Known

False Negatives: None Known

Corrective Action: Disable XFS in the inetd configuration file (normally 
/etc/inetd.conf under line fs.auto).

Contributors: Original rule writer unknown.
              Josh Sakofsky
Additional References: http://cgi.nessus.org/plugins/dump.php3?id=11188
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.snort.org/pipermail/snort-sigs/attachments/20030606/a45a10ae/attachment.html>

More information about the Snort-sigs mailing list