Sophie

Sophie

distrib > Mandriva > 2006.0 > x86_64 > by-pkgid > 56c5837d9d111437878acba01e4df73e > files > 409

snort-2.3.3-2.3.20060mdk.x86_64.rpm

Rule:

--
Sid:
1252

--
Summary:
This event is generated after a sucessful exploit of the BSD derived Telnet daemon.

--
Impact:
Remote root access.  This may or may not indicate a successful root 
compromise of a telnet server.

--
Detailed Information:
This event is generated after a possible sucessful attempt to compromise
a server running a BSD derived version of Telnet. A buffer overflow
condition exists that may present an attacker with the opportunity to
execute code of their choosing.

The attacker does not need to login to the server to exploit this
vulnerability, only a connection to the server is needed.

--
Affected Systems:
	Multiple Vendor Telnet servers running versions of telnetd derived
	from the BSD telnet daemon.

--
Attack Scenarios:
An attacker may utilize one of the available exploit scripts.

--
Ease of Attack:
Simple. Exploit scripts are publicly available. This vulnerability may
also be exploited by a worm.

--
False Positives:
None known.

--
False Negatives:
None known.

--
Corrective Action:
Consider using Secure Shell instead of telnet.

Block inbound telnet access if it is not required.

--
Contributors:
Sourcefire Research Team
Brian Caswell <bmc@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>

--
Additional References:

--