[Snort-sigs] rule documentation for MISC xfs overflow attempt

Josh.Sakofsky at ...1573... Josh.Sakofsky at ...1573...
Fri Jun 6 12:07:41 EDT 2003


Rule: MISC xfs overflow attempt

--
Sid: 1987

--
Summary: A remote user has attempted to exploit a flaw in the X Windows 
Font Service.

--
Impact: Serious

--
Detailed Information: Certain versions of XFS distributed with Sun's 
Solaris are vulnerable to a remote buffer overflow.
The Dispatch() routine within fs.auto does not provide adequate 
bounds-checking.

--
Affected Systems: Sun Solaris 2.5.1 to 9 (Update 2)
--
Attack Scenarios: An attacker must have access to tcp port 7100. The 
attacker can then either cause XFS to crash or run code as
user "nobody".

--
Ease of Attack: Difficult

--
False Positives: None Known

--
False Negatives: None Known

--
Corrective Action: Disable XFS in the inetd configuration file (normally 
/etc/inetd.conf under line fs.auto).

--
Contributors: Original rule writer unknown.
              Josh Sakofsky
-- 
Additional References: http://cgi.nessus.org/plugins/dump.php3?id=11188
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1317
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.snort.org/pipermail/snort-sigs/attachments/20030606/a45a10ae/attachment.html>


More information about the Snort-sigs mailing list