Provided by Aanval (Snort & Syslog Intrusion Detection and Correlation Engine) www.aanval.com
--
| GEN:SID | 1:1987 |
| Message | MISC xfs overflow attempt |
| Summary | This event is generated when an attempt is made to exploit a flaw in the X Windows Font Service. |
| Impact | Arbitrary code execution. Denial of Service. |
| Detailed Information | Certain versions of XFS distributed with Sun's Solaris are vulnerable to a remote buffer overflow. The Dispatch() routine within fs.auto does not provide adequate bounds-checking. |
| Affected Systems | Sun Solaris 2.5.1 to 9 (Update 2) |
| Attack Scenarios | An attacker must have access to tcp port 7100. The attacker can then either cause XFS to crash or run code as user "nobody". |
| Ease of Attack | Difficult |
| Corrective Action | Disable XFS in the inetd configuration file (normally /etc/inetd.conf under line fs.auto). |
| Additional References | Nessus: http://cgi.nessus.org/plugins/dump.php3?id=11188 CVE: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1317 |
| Rule References | bugtraq: 6241 cve: 2002-1317 nessus: 11188 |
--
DID:219226
--
http://www.aanval.com/