csi
February 2nd, 2005, 13:41
Hey,
I ran a nessus scan on my host pc and got the report back, but im not sure where to find the content i need to write my rule. I have read the Snort rule manual, but i dont know where to find the info i need for the content part
alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"FTP CEL overflow attempt";flow:to_server,established; content:"CEL "; nocase; content:!"|0a|"; within:100; reference:bugtraq,679; reference:cve,CVE-1999-0789; reference:arachnids,257; classtype:attempted-admin; sid:337; rev:5;)
where could i find were its says "CEL " and |0a|. ( i know my content might be diff).
what would i write for this one:
The remote host is running a version of ProFTPd which seems
to be vulnerable to a buffer overflow when a user downloads
a malformed ASCII file.
An attacker with upload privileges on this host may abuse this
flaw to gain a root shell on this host.
*** The author of ProFTPD did not increase the version number
*** of his product when fixing this issue, so it might be false
*** positive.
Solution : Upgrade to ProFTPD 1.2.9 when available or to 1.2.8p
Risk Factor : High
BID : 8679
Nessus ID : 11849
Also how would i know if the latest snort rules for my version cover a specific vulnerablity or expliot?
any help would be very helpful
thanks csi
I ran a nessus scan on my host pc and got the report back, but im not sure where to find the content i need to write my rule. I have read the Snort rule manual, but i dont know where to find the info i need for the content part
alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"FTP CEL overflow attempt";flow:to_server,established; content:"CEL "; nocase; content:!"|0a|"; within:100; reference:bugtraq,679; reference:cve,CVE-1999-0789; reference:arachnids,257; classtype:attempted-admin; sid:337; rev:5;)
where could i find were its says "CEL " and |0a|. ( i know my content might be diff).
what would i write for this one:
The remote host is running a version of ProFTPd which seems
to be vulnerable to a buffer overflow when a user downloads
a malformed ASCII file.
An attacker with upload privileges on this host may abuse this
flaw to gain a root shell on this host.
*** The author of ProFTPD did not increase the version number
*** of his product when fixing this issue, so it might be false
*** positive.
Solution : Upgrade to ProFTPD 1.2.9 when available or to 1.2.8p
Risk Factor : High
BID : 8679
Nessus ID : 11849
Also how would i know if the latest snort rules for my version cover a specific vulnerablity or expliot?
any help would be very helpful
thanks csi