Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 30 Nov 2001 02:55:06 +0400
From:      SM <nntp@iname.com>
To:        Emre Bastuz <info@emre.de>, security@FreeBSD.ORG
Subject:   Re: sshd: rcvd big packet ?
Message-ID:  <3.0.5.32.20011130025506.008447c0@iname.com>
In-Reply-To: <3C0692F1.2040904@emre.de>

next in thread | previous in thread | raw e-mail | index | archive | help
At 20:56 29-11-2001 +0100, Emre Bastuz wrote:
>I=B4m running snort 1.8.1 on this box - the IDS did not leave any attack
alerts ?

From the Snort 1.8.2 rules:

alert tcp $EXTERNAL_NET any -> $HOME_NET 22 (msg:"EXPLOIT ssh CRC32
overflow /bin/sh"; flags:A+; content:"/bin/sh"; reference:bugtraq,2347;
reference:cve,CVE-2001-0144; classtype:shellcode-detect; sid:1324; rev:1;)

alert tcp $EXTERNAL_NET any -> $HOME_NET 22 (msg:"EXPLOIT ssh CRC32
overflow filler"; flags:A+; content:"|00 00 00 00 00 00 00 00 00 00 00 00
00|"; reference:bugtraq,2347; reference:cve,CVE-2001-0144;
classtype:shellcode-detect; sid:1325; rev:1;)

alert tcp $EXTERNAL_NET any -> $HOME_NET 22 (msg:"EXPLOIT ssh CRC32
overflow NOOP"; flags:A+; content:"|90 90 90 90 90 90 90 90 90 90 90 90 90
90 90 90|"; reference:bugtraq,2347; reference:cve,CVE-2001-0144;
classtype:shellcode-detect; sid:1326; rev:1;)

alert tcp $EXTERNAL_NET any -> $HOME_NET 22 (msg:"EXPLOIT ssh CRC32
overflow"; flags:A+; content:"|00 01 57 00 00 00 18|"; offset:0; depth:7;
content:"|FF FF FF FF 00 00|"; offset:8; depth:14; reference:bugtraq,2347;
reference:cve,CVE-2001-0144; classtype:shellcode-detect; sid:1327; rev:1;)

Regards,
-sm

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3.0.5.32.20011130025506.008447c0>