Provided by Aanval (Snort & Syslog Intrusion Detection and Correlation Engine) www.aanval.com
--
GEN:SID | 1:1987 |
Message | MISC xfs overflow attempt |
Summary | This event is generated when an attempt is made to exploit a flaw in the X Windows Font Service. |
Impact | Arbitrary code execution. Denial of Service. |
Detailed Information | Certain versions of XFS distributed with Sun's Solaris are vulnerable to a remote buffer overflow. The Dispatch() routine within fs.auto does not provide adequate bounds-checking. |
Affected Systems | Sun Solaris 2.5.1 to 9 (Update 2) |
Attack Scenarios | An attacker must have access to tcp port 7100. The attacker can then either cause XFS to crash or run code as user "nobody". |
Ease of Attack | Difficult |
Corrective Action | Disable XFS in the inetd configuration file (normally /etc/inetd.conf under line fs.auto). |
Additional References | Nessus: http://cgi.nessus.org/plugins/dump.php3?id=11188 CVE: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1317 |
Rule References | bugtraq: 6241 cve: 2002-1317 nessus: 11188 |
--
DID:219226
--
http://www.aanval.com/