VRT Advisories


May 2005 Archive

VRT Rules 2005-05-31

Sourcefire VRT Certified Rules Update

Date: 2005-05-31

Synopsis:

The Sourcefire Vulnerability Research Team (VRT) has learned of serious vulnerabilities affecting MySQL and Ethereal. The VRT has also completed work to normalize older rules to improve the detection capabilities of the Snort engine.

Details:

There are two vulnerabilities associated with MySQL password authentication. The first vulnerability may permit an unauthorized user access to the server if the attacker knows an authorized username and crafts a malicious client password hash. The second vulnerability may cause a denial of service or buffer overflow if an attacker knows an authorized username and crafts an overly long password hash.

Rules to detect attacks against this vulnerability are included in this rule pack and are identified as sids 3665 and 3672.

An error in the processing of tcp packets in a SIP protocol transaction may lead to a Denial of Service (DoS) condition in Ethereal. The SIP parsing routine does not properly check the length of data supplied to a fixed length buffer in the processing of the SIP data.

Rules to detect attacks against this vulnerbility are included in this rule pack and are identified as sids 3677 and 3678.

Rule Pack Summary:

For a complete list of new and modified rules, click here.

Warning:

Sourcefire VRT rule packs often utilize enhancements made to Snort. Operators should upgrade to the latest revision or patch level for Snort to ensure these enhancements are available before using these rules.

About the VRT:

The Sourcefire VRT is a group of leading edge intrusion detection and prevention experts working to proactively discover, assess and respond to the latest trends in hacking activity, intrusion attempts and vulnerabilities. This team is also supported by the vast resources of the open source Snort community, making it the largest group dedicated to advances in network security industry.

Posted by on May 31, 2005



VRT Rules 2005-05-18

Sourcefire VRT Certified Rules Update

Date: 2005-05-18

Synopsis:

After continuing research into vulnerabilities affecting BrightStor ARCserve Backup Universal Agent and the CVS daemon, the Sourcefire Vulnerability Research Team (VRT) has released a number of rules to detect attacks against vulnerabilities in these products.

Details:

A vulnerability exists in the way that a the BrightStor ARCserve Backup Universal Agent processes messages with overly long data. The Universal Agent software of the ARCserve Backup suite is used to push backups from individual hosts to the server component. A message with a combination of specific option types, length value ranges and overly long data sent to a Universal Agent listener can cause a buffer overflow and the subsequent execution of arbitrary code with system level privileges on a vulnerable server.

Rules to detect this vulnerability are included in this rule pack and are identified as sids 3658 through 3663.

CVS is the Concurrent Versions System, commonly used to help manage software development. A user with branching privileges can exploit a vulnerability associated with the cvs annotate command to cause a buffer overflow to occur.

Rules to detect this vulnerability are included in this rule pack and are identified as sids 3651 through 3652.

Rule Pack Summary:

For a complete list of new and modified rules, click here.

Warning:

Sourcefire VRT rule packs often utilize enhancements made to Snort. Operators should upgrade to the latest revision or patch level for Snort to ensure these enhancements are available before using these rules.

About the VRT:

The Sourcefire VRT is a group of leading edge intrusion detection and prevention experts working to proactively discover, assess and respond to the latest trends in hacking activity, intrusion attempts and vulnerabilities. This team is also supported by the vast resources of the open source Snort community, making it the largest group dedicated to advances in network security industry.

Posted by on May 18, 2005



VRT Rules 2005-05-04

Sourcefire VRT Certified Rules Update

Date: 2005-05-04

Synopsis:

After continuing research into vulnerabilities in Oracle, Computer Associates License Application and the Mozilla web browser, the Sourcefire Vulnerability Research Team (VRT) has released a number of rules to detect attacks against vulnerabilities in these products.

Details:

An attacker can supply the Oracle XDB FTP service an overly long value to the FTP TEST subcommand. This can cause a buffer overflow, allowing an attacker to execute arbitrary code. An attacker must be authenticated to the FTP service in order to exploit this vulnerability.

Rules to detect attacks against this vulnerability are included in this rule pack and are identified as sids 3630 and 3631.

Computer Associates License software allows a site to maintain and handle licenses for CA products. A server runs the software to facilitate this and it communicates with clients/agents on the network. A vulnerability exists in the PUTOLF message that exchanges data with a listening server or client.

A rule to detect attacks against this vulnerability is included in this rule pack and is identified as sid 3637.

The Mozilla browser is vulnerable to an integer overflow when processing images in Bitmap (BMP) format. Programming errors may present an attacker with the opportunity to cause the integer overflow due to insufficient bounds checking in the code that handles bitmap images.

Rules to detect attacks against this vulnerbility are included in this rule pack and are identified as sids 3632 through 3634.

Rule Pack Summary:

For a complete list of new and modified rules, click here.

Warning:

Sourcefire VRT rule packs often utilize enhancements made to Snort. Operators should upgrade to the latest revision or patch level for Snort to ensure these enhancements are available before using these rules.

About the VRT:

The Sourcefire VRT is a group of leading edge intrusion detection and prevention experts working to proactively discover, assess and respond to the latest trends in hacking activity, intrusion attempts and vulnerabilities. This team is also supported by the vast resources of the open source Snort community, making it the largest group dedicated to advances in network security industry.

Posted by on May 04, 2005