if ($_SERVER[HTTP_HOST] == "www.hillstonenet.com") { echo ''; echo '
|
|||
Release Date:2009-09-27
Attack Name:Snorkerz.cmd access
OS Type:Window Linux Unix Macintosh Others
Application Type:
Severity:Info
BUG ID:
CVE ID:
Description:
|
This event is generated when an attempt is made to gain unauthorized
access to a CGI application running ona web server. Some applications do
not perform stringent checks when validating the credentials of a client
host connecting to the services offered on a host server. This can lead
to unauthorized access and possibly escalated privileges to that of the
administrator. Data stored on the machine can be compromised and trust
relationships between the victim server and other hosts can be exploited by the attacker.
If stringent input checks are not performed by the CGI application, it
may also be possible for an attacker to execute system binaries or
malicious code of the attackers choosing.
Impact:
Information gathering and system integrity compromise. Possible unauthorized
administrative access to the server or application. Possible execution
of arbitrary code of the attackers choosing in some cases.
Affected Systems:
All systems running CGI applications
Solution:
|
Ensure the system is using an up to date version of the software and has had all vendor supplied patches applied.