Sophie

Sophie

distrib > Mandriva > 2006.0 > x86_64 > by-pkgid > 56c5837d9d111437878acba01e4df73e > files > 1071

snort-2.3.3-2.3.20060mdk.x86_64.rpm

Rule:

Sid:
1907

--
Summary:
This event is generated when an attempt is made to exploit a buffer overflow associated with the Remote Procedure Call (RPC) Remote Procedure Call (RPC) Remote Procedure Call (RPC) Remote Procedure Call (RPC) Remote Procedure Call (RPC) Remote Procedure Call (RPC) Remote Procedure Call (RPC) Remote Procedure Call (RPC) Remote Procedure Call (RPC) Calendar Manager Service daemon, cmsd.

--
Impact:
Remote root access.  The attack may allow execution of arbitrary commands with the privileges of root.

--
Detailed Information:
The cmsd RPC service implements the Calendar Manager Service daemon that is often distributed with the Common Desktop Environment (CDE) and Open Windows.  The Calendar Manager daemon provides appointment and scheduling functions for CDE.  A buffer overflow exists in the rtable_insert() function because of improper bounds checking, allowing the execution of arbitrary commands with the privileges of root.  One possible exploit vector is by creating a new calendar.
 
--
Affected Systems:
SCO Open Unix 8.0
SCO UnixWare 7.1.1
HP-UX 10.20, 10.24, 10.30, 11.0
Sun Solaris 2.3, 2.4, 2.5, 2.5.1, 2.6, 7.0
Sun SunOS 4.1.3, 4.1.4

--
Attack Scenarios:
The attacker can use the exploit code to overflow the buffer allowing execution of arbitrary commands with the privileges of root.

--
Ease of Attack:
Simple.  Exploit code if freely available.

--
False Positives:
None Known.

--
False Negatives:
None Known.

--
Corrective Action:
Limit remote access to RPC services.

Filter RPC ports at the firewall to ensure access is denied to RPC-enabled machines. 

Disable unneeded RPC services.

--
Contributors:
Original rule written by Brian Caswell <bmc@sourcefire.com>
Sourcefire Research Team
Judy Novak <judy.novak@sourcefire.com>

--
Additional References:

CVE
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0696

Bugtraq
http://www.securityfocus.com/bid/524


--