Rule Category
SERVER-OTHER -- Snort has detected traffic exploiting vulnerabilities in a server in the network.
Alert Message
SERVER-OTHER Apache mod_auth_digest out of bounds read attempt
Rule Explanation
This rule looks for data in the Authorization header that triggers the information leak vulnerability in mod_auth_digest of Apache.
What To Look For
This rules looks for attempts to leak memory from mod_auth_digest of Apache.
Known Usage
No public information
False Positives
No known false positives
Contributors
Cisco Talos Intelligence Group
Rule Groups
MITRE::ATT&CK Framework::Enterprise::Initial Access::Exploit Public-Facing Application
Adversaries may attempt to take advantage of a weakness in an Internet-facing computer or program using software, data, or commands in order to cause unintended or unanticipated behavior. The weakness in the system can be a bug, a glitch, or a design vulnerability. These applications are often websites, but can include databases (like SQL), standard services (like SMB or SSH), network device administration and management protocols (like SNMP and Smart Install), and any other applications with Internet accessible open sockets, such as web servers and related services.
T1190
Rule Categories::Server::Apache
Rules for detecting attacks against Apache servers
Additional Links
Rule Vulnerability
Information Leak
Information Leakage happens when an attacker manipulates a system into revealing sensitive information, either through malformed input or by taking advantage of another feature of the system.
CVE Additional Information
This product uses data from the NVD API but is not endorsed or certified by the NVD.
CVE-2017-9788
|
Loading description
|
|
Severity | |
Base Score | |
Impact Score | |
Exploit Score | |
Confidentiality Impact | |
Integrity Impact | |
Availability Impact | |
Authentication | |
Ease of Access | |
|