Rule:

--
Sid:
3629

--
Summary:
This event is generated when an attempt is made to access a vulnerable
script associated with the Sambar web server.

--
Impact:
Serious. Execution of arbitrary commands may be possible.

--
Detailed Information:
The Sambar web server has a search engine that searches for a
user-supplied value.  This becomes the value associated with the
query parameter. An overly long value can cause a buffer overflow and
the subsequent execution of arbitrary code on a vulnerable server.

This rule generates and event when the vulnerable page "results.stm" is
accessed.

--
Affected Systems:
	Sambar Server 3.x, 4.x, 5.x

--
Attack Scenarios:
An attacker can craft a search request with an overly long value supplied
to the query parameter, causing a buffer overflow.

--
Ease of Attack:
Simple.

--
False Positives:
None known.

--
False Negatives:
None known.

--
Corrective Action:
Upgrade to the most current nonaffected version of the software.

--
Contributors:
Sourcefire Vulnerability Research Team
Judy Novak <judy.novak@sourcefire.com>

--
Additional References:

OSVDB:
www.osvdb.org/displayvuln.php?osvdb_id=2204

--
