Security Incidents mailing list archives

Re: spoolss overflow attempt: unknow threat or false alert ?


From: Emanuele Rocca <ema () linux it>
Date: Fri, 8 Sep 2006 10:35:28 +0200

Hello,

* Buozis, Martynas <martynas () ti com>, [2006-09-07 16:10 +0200]:
 I see many packets coming from various hosts to few servers (both
 clients and servers are inside Intranet) that are identified by SNORT as
 NETBIOS SMB spoolss AddPrinterEx unicode little endian overflow attempt.
 I checked source hosts with AV and spyware software but found nothing,
 while these packets continue to flow persistently in large amounts. Is
 it some false positive by SNORT or is it an unknown security threat
 (trojan/worm/virus) behind this activity? 

I've got no direct experience about that alert, but the Snort signature
database can give you additional information:
http://www.snort.org/pub-bin/sigs.cgi?sid=4414

Summary:
This event is generated when an attempt is made to exploit a known 
vulnerability in Microsoft systems using the Print Spooler Service. 
In particular this rule generates an event when an attempt is made 
to exploit the function "AddPrinterEx" via the "spoolss" component.

False positives:
None known.

Another reference you may find interesting is the MS Security Bulletin:
http://www.microsoft.com/technet/security/bulletin/MS05-043.mspx

ciao,
    ema

Attachment: signature.asc
Description: Digital signature


Current thread: