Section 13-4. IDS Sensor Signature List

team bbl


13-4. IDS Sensor Signature List

Cisco IDS signatures are given unique signature ID numbers. The numbers range from 900 to 50000, with each range using a particular inspection engine to detect intrusion activity for a group of protocols or types of applications.

Table 13-1 lists the ranges of signature IDs. Signature IDs 900 to 19999 are assigned by Cisco and are supplied in downloadable databases or in databases embedded in operating system images. IDs 20000 to 50000 are reserved for custom signatures.

Table 13-1. Cisco IDS Signature ID Number Ranges

Signature ID

Signature Series

Types of Signature

900 to 999

IDS diagnostics

IDS sensor events

1000 to 1999

IP

IP options

IP fragmentation

Bad IP packets

2000 to 2999

ICMP

ICMP traffic records

Ping sweeps

ICMP attacks

3000 to 3999

TCP

TCP traffic records

TCP port scans

TCP host sweeps

Mail attacks

FTP attacks

Legacy CIDS web attacks (signature IDs 3200 to 3233)

NetBIOS attacks

SYN flood and TCP hijack attacks

TCP applications

4000 to 4999

UDP

UDP traffic records

UDP port scan

UDP attacks

UDP applications

5000 to 5999

Web (HTTP)

Web attacks

6000 to 6999

Cross-protocol

DNS attacks

RPC services attacks

Authentication failures

Loki attacks

Distributed DoS attacks

7000 to 7999

ARP

ARP attacks

8000 to 8999

String match

Custom string matches

TCP applications

9000 to 9999

Back door

Back door probes

Back door responses

10000 to 10999

ACL policy violation

IP spoof

11000 to 11999

Peer to peer

P2P file-sharing attacks

Instant messenger attacks

12000 to 19999

Spyware

Spyware software activity

20000 to 50000

Custom-defined


Cisco maintains one set of unique signature IDs that is common across all its IDS platforms. Table 13-2 lists the signatures supported by firewall and router IDS sensors. Some signatures are present in one platform but not in another. The table shows whether the signature is available in Cisco IOS software Release 12.2(11)YU and earlier (IOS), Cisco IOS software Release 12.2(15)T and later (IOS+), or Cisco PIX OS release 6.0 and later (PIX).

Table 13-2. Cisco Firewall and Router IDS Sensor Signatures

Signature

Severity

Type

IOS

IOS+

PIX

Description

1000 IP OptionsBad Option List

Info

Atomic

Yes

Yes

Yes

Triggers on receipt of an IP datagram where the list of IP options in the IP datagram header is incomplete or malformed. The IP options list contains one or more options that perform various network management or debugging tasks.

1001 IP OptionsRecord Packet Route

Info

Atomic

Yes

Yes

Yes

Triggers on receipt of an IP datagram where the IP option list for the datagram includes option 7 (Record Packet Route).

1002 IP OptionsTimestamp

Info

Atomic

Yes

Yes

Yes

Triggers on receipt of an IP datagram where the IP option list for the datagram includes option 4 (Timestamp).

1003 IP OptionsProvide s,c,h,tcc

Info

Atomic

Yes

Yes

Yes

Triggers on receipt of an IP datagram where the IP option list for the datagram includes option 2 (Security options).

1004 IP OptionsLoose Source Route

Info

Atomic

Yes

Yes

Yes

Triggers on receipt of an IP datagram where the IP option list for the datagram includes option 3 (Loose Source Route).

1005 IP OptionsSATNET ID

Info

Atomic

Yes

Yes

Yes

Triggers on receipt of an IP datagram where the IP option list for the datagram includes option 8 (SATNET stream identifier).

1006 IP OptionsStrict Source Route

Info

Atomic

Yes

Yes

Yes

Triggers on receipt of an IP datagram in which the IP option list for the datagram includes option 2 (Strict Source Routing).

1100 IP Fragment Attack

Attack

Atomic

Yes

Yes

Yes

Triggers when any IP datagram is received with an offset value less than 5 but greater than 0 indicated in the offset field.

1101 Unknown IP Protocol

Info

Atomic

Yes

Yes

No

Triggers when an IP datagram is received with the protocol field set to 134 or greater. These protocol types are undefined or reserved and should not be used.

1102 Impossible IP Packet

Attack

Atomic

Yes

Yes

Yes

Triggers when an IP packet arrives with source equal to destination address. This signature catches the so-called land attack.

1103 IP Fragments Overlap

Attack

Compound

No

Yes

Yes

Triggers when two fragments contained within the same IP datagram have offsets that indicate that they share positioning within the datagram.

1104 IP Localhost Source Spoof

Attack

Atomic

No

Yes

No

Triggers when an IP packet with an address of 127.0.0.1 is detected.

1105 Broadcast Source Address

Attack

Atomic

No

Yes

No

Triggers when an IP packet with a source address of 255.255.255.255 is detected.

1106 Multicast IP Source Address

Attack

Atomic

No

Yes

No

Triggers when an IP packet with a source address of 224.x.x.x is detected.

1107 RFC 1918 Addresses Seen

Info

Atomic

No

Yes

No

Triggers when RFC 1918 addresses are detected.

1202 IP Fragment OverrunDatagram Too Long

Attack

Atomic

No

Yes

No

Triggers when a reassembled fragmented datagram would exceed the declared IP data length or the maximum datagram length.

1206 IP Fragment Too Small

Attack

Atomic

No

Yes

No

Triggers when any fragment other than the final fragment is less than 400 bytes, indicating that the fragment is likely intentionally crafted.

2000 ICMP Echo Reply

Info

Atomic

Yes

Yes

Yes

Triggers when an IP datagram is received with the protocol field of the IP header set to 1 (ICMP) and the type field of the ICMP header set to 0 (Echo Reply).

2001 ICMP Host Unreachable

Info

Atomic

Yes

Yes

Yes

Triggers when an IP datagram is received with the protocol field of the IP header set to 1 (ICMP) and the type field of the ICMP header set to 3 (Host Unreachable).

2002 ICMP Source Quench

Info

Atomic

Yes

Yes

Yes

Triggers when an IP datagram is received with the protocol field of the IP header set to 1 (ICMP) and the type field of the ICMP header set to 4 (Source Quench).

2003 ICMP Redirect

Info

Atomic

Yes

Yes

Yes

Triggers when an IP datagram is received with the protocol field of the IP header set to 1 (ICMP) and the type field of the ICMP header set to 5 (Redirect).

2004 ICMP Echo Request

Info

Atomic

Yes

Yes

Yes

Triggers when an IP datagram is received with the protocol field of the IP header set to 1 (ICMP) and the type field of the ICMP header set to 8 (Echo Request).

2005 ICMP Time Exceeded for a Datagram

Info

Atomic

Yes

Yes

Yes

Triggers when an IP datagram is received with the protocol field of the IP header set to 1 (ICMP) and the type field of the ICMP header set to 11 (Time Exceeded for a Datagram).

2006 ICMP Parameter Problem on Datagram

Info

Atomic

Yes

Yes

Yes

Triggers when an IP datagram is received with the protocol field of the IP header set to 1 (ICMP) and the type field of the ICMP header set to 12 (Parameter Problem on Datagram).

2007 ICMP Timestamp Request

Info

Atomic

Yes

Yes

Yes

Triggers when an IP datagram is received with the protocol field of the IP header set to 1 (ICMP) and the type field of the ICMP header set to 13 (Timestamp Request).

2008 ICMP Timestamp Reply

Info

Atomic

Yes

Yes

Yes

Triggers when an IP datagram is received with the protocol field of the IP header set to 1 (ICMP) and the type field of the ICMP header set to 14 (Timestamp Reply).

2009 ICMP Information Request

Info

Atomic

Yes

Yes

Yes

Triggers when an IP datagram is received with the protocol field of the IP header set to 1 (ICMP) and the type field of the ICMP header set to 15 (Information Request).

2010 ICMP Information Reply

Info

Atomic

Yes

Yes

Yes

Triggers when an IP datagram is received with the protocol field of the IP header set to 1 (ICMP) and the type field of the ICMP header set to 16 (ICMP Information Reply).

2011 ICMP Address Mask Request

Info

Atomic

Yes

Yes

Yes

Triggers when an IP datagram is received with the protocol field of the IP header set to 1 (ICMP) and the type field of the ICMP header set to 17 (Address Mask Request).

2012 ICMP Address Mask Reply

Info

Atomic

Yes

Yes

Yes

Triggers when an IP datagram is received with the protocol field of the IP header set to 1 (ICMP) and the type field of the ICMP header set to 18 (Address Mask Reply).

2150 Fragmented ICMP Traffic

Attack

Atomic

Yes

Yes

Yes

Triggers when an IP datagram is received with the protocol field of the IP header set to 1 (ICMP) and either the more fragments flag is set to 1 (ICMP) or an offset is indicated in the offset field.

2151 Large ICMP Traffic

Attack

Atomic

Yes

Yes

Yes

Triggers when an IP datagram is received with the protocol field of the IP header set to 1 (ICMP) and the IP length is greater than 1024.

2154 Ping of Death Attack

Attack

Atomic

Yes

Yes

Yes

Triggers when an IP datagram is received with the protocol field of the IP header set to 1 (ICMP), the Last Fragment bit is set, and (IP offset * 8 ) + (IP data length) is greater than 65,535. In other words, the IP offset (which represents the starting position of this fragment in the original packet, and which is in 8-byte units) plus the rest of the packet is greater than the maximum size for an IP packet.

3038 Fragmented NULL TCP Packet

Attack

Atomic

No

Yes

No

Triggers when a single fragmented TCP packet with none of the SYN, FIN, ACK, or RST flags set has been sent to a specific host.

3039 Fragmented Orphaned FIN Packet

Attack

Atomic

No

Yes

No

Triggers when a single fragmented orphaned TCP FIN packet is sent to a privileged port (having a port number less than 1024) on a specific host.

3040 NULL TCP Packet

Attack

Atomic

Yes

Yes

Yes

Triggers when a single TCP packet with none of the SYN, FIN, ACK, or RST flags set has been sent to a specific host.

3041 SYN/FIN Packet

Attack

Atomic

Yes

Yes

Yes

Triggers when a single TCP packet with the SYN and FIN flags set has been sent to a specific host.

3042 Orphaned FIN Packet

Attack

Atomic

Yes

Yes

Yes

Triggers when a single orphaned TCP FIN packet is sent to a privileged port (having a port number less than 1024) on a specific host.

3043 Fragmented SYN/FIN Packet

Attack

Atomic

No

Yes

No

Triggers when a single fragmented TCP packet with the SYN and FIN flags set has been sent to a specific host.

3050 Half-open SYN Attack

Attack

Compound

Yes

Yes

No

Triggers when multiple TCP sessions have been improperly initiated on any of several well-known service ports. Detection of this signature is currently limited to FTP, Telnet, WWW, SSH, and e-mail servers (TCP ports 21, 23, 80, 22, and 25, respectively).

3100 Smail Attack

Attack

Compound

Yes

Yes

No

Triggers on the very common smail attack against e-mail servers.

3101 Sendmail Invalid Recipient

Attack

Compound

Yes

Yes

No

Triggers on any mail message with a pipe symbol (|) in the recipient field.

3102 Sendmail Invalid Sender

Attack

Compound

Yes

Yes

No

Triggers on any mail message with a pipe symbol (|) in the From: field.

3103 Sendmail Reconnaissance

Attack

Compound

Yes

Yes

No

Triggers when expn or vrfy commands are issued to the SMTP port.

3104 Archaic Sendmail Attacks

Attack

Compound

Yes

Yes

No

Triggers when wiz or debug commands are sent to the SMTP port.

3105 Sendmail Decode Alias

Attack

Compound

Yes

Yes

No

Triggers on any mail message with : decode@ in the header.

3106 Mail Spam

Attack

Compound

Yes

Yes

No

Counts the number of Rcpt to: lines in a single mail message and alarms after a user-definable maximum has been exceeded (the default is 250).

3107 Majordomo Execute Attack

Attack

Compound

Yes

Yes

No

A bug in the Majordomo program allows remote users to execute arbitrary commands at the server's privilege level.

3150 FTP Remote Command Execution

Attack

Compound

Yes

Yes

No

Triggers when someone tries to execute the FTP SITE command.

3151 FTP SYST Command Attempt

Info

Compound

Yes

Yes

No

Triggers when someone tries to execute the FTP SYST command.

3152 FTP CWD ~root

Attack

Compound

Yes

Yes

No

Triggers when someone tries to execute the CWD ~root command.

3153 FTP Improper Address Specified

Attack

Atomic

Yes

Yes

Yes

Triggers if a port command is issued with an address that is not the same as the requesting host.

3154 FTP Improper Port Specified

Attack

Atomic

Yes

Yes

Yes

Triggers if a port command is issued with a data port specified that is less than 1024 or greater than 65535.

3215 IIS DOT DOT EXECUTE Attack

Attack

Compound

No

Yes

No

Triggers on any attempt to cause Microsoft's Internet Information Server to execute commands.

3229 Website Win-C-Sample Buffer Overflow

Attack

Compound

No

Yes

No

Triggers when an attempt is made to access the win-c-sample program distributed with WebSite servers.

3233 WWW count-cgi Overflow

Attack

Compound

No

Yes

No

Triggers when an attempt is made to overflow a buffer in the cgi Count program.

4050 UDP Bomb

Attack

Atomic

Yes

Yes

Yes

Triggers when the UDP length specified is less than the IP length specified. This malformed packet type is associated with a denial of service attempt.

4051 Snork

Attack

Atomic

No

Yes

Yes

Triggers when a UDP packet with a source port of either 135, 7, or 19 and a destination port of 135 is detected.

4052 Chargen DoS

Attack

Atomic

No

Yes

Yes

Triggers when a UDP packet is detected with a source port of 7 and a destination port of 19.

4100 TFTP Passwd File

Attack

Compound

Yes

Yes

No

Triggers on an attempt to access the passwd file via TFTP. This indicates an attempt to gain unauthorized access to system resources.

4600 IOS UDP Bomb

Attack

Atomic

No

Yes

No

Triggers on the receipt of improperly formed Syslog transmissions bound for UDP port 514.

5034 WWW IIS newdsn Attack

Attack

Compound

No

Yes

No

Triggers when an attempt is made to run the newdsn.exe command via the HTTP server.

5035 HTTP cgi HylaFAX Faxsurvey

Attack

Compound

No

Yes

No

Triggers when an attempt is made to pass commands to the CGI program faxsurvey. A problem in the CGI program faxsurvey, included with the HylaFAX package from SGI, allows an attacker to execute commands on the host machine. These commands execute at the privilege level of the HTTP server. There are no legitimate reasons to pass commands to the faxsurvey command.

5041 WWW Anyform Attack

Attack

Compound

No

Yes

No

Triggers when an attacker attempts to execute arbitrary commands through the anyform cgi-bin script.

5043 WWW Cold Fusion Attack

Attack

Compound

No

Yes

No

Triggers when an attempt is made to access sample scripts shipped with Cold Fusion servers.

5044 WWW Webcom.se Guestbook Attack

Attack

Compound

No

Yes

No

Triggers when an attacker attempts to execute arbitrary commands through Webcom.se's rguest.exe or wguest.exe cgi-bin script.

5045 WWW xterm Display Attack

Attack

Compound

No

Yes

No

Triggers when any cgi-bin script attempts to execute the command xterm -display.

5050 WWW IIS .htr Overflow Attack

Attack

Compound

No

Yes

No

Triggers when an .htr buffer overrun attack is detected, indicating a possible attempt to execute remote commands or to cause a denial of service against the targeted Windows NT IIS server.

5055 HTTP Basic Authentication Overflow

Attack

Compound

No

Yes

No

A buffer overflow can occur on vulnerable web servers if a very large username and password combination is used with Basic Authentication.

5071 WWW msacds.dll Attack

Attack

Compound

No

Yes

No

An attempt has been made to execute commands or view secured files with privileged access.

5081 WWW WinNT cmd.exe Access

Attack

Atomic

No

Yes

No

Triggers when the use of the Windows NT cmd.exe is detected in a URL.

5090 WWW FrontPage htimage.exe Access

Attack

Atomic

No

Yes

No

Triggers when the FrontPage CGI program is accessed with a filename argument ending in 0,0.

5114 WWW IIS Unicode Attack

Attack

Atomic

No

Yes

No

Triggers when an attempt to exploit the Unicode ../ directory traversal vulnerability is detected.

5116 Endymion MailMan Remote Command Execution

Attack

Atomic

No

Yes

No

Endymion MailMan insecurely uses the Perl function open(), which allows user-supplied input containing shell metacharacters to be executed as shell commands with the privilege level of the CGI script.

5117 phpGroupWare Remote Command Exec

Attack

Atomic

No

Yes

No

phpGroupWare is a multiuser groupware suite that is freely distributed. A problem in the software could allow users to remotely execute malicious code by exploiting a vulnerable include() command.

5118 eWave ServletExec 3.0C File Upload

Attack

Atomic

No

Yes

No

UploadServlet is a servlet that ServletExec contains in its server-side classes.

5123 WWW Host: Field Overflow

Attack

Atomic

No

Yes

No

This alarm fires if web traffic is detected sending an abnormally large GET request with a large Host field.

6050 DNS HINFO Request

Info

Atomic

No

Yes

Yes

Triggers on an attempt to access HINFO records from a DNS server.

6051 DNS Zone Transfer

Info

Atomic

No

Yes

Yes

Triggers on normal DNS zone transfers, in which the source port is 53.

6052 DNS Zone Transfer from High Port

Attack

Atomic

No

Yes

Yes

Triggers on an illegitimate DNS zone transfer, in which the source port is not equal to 53.

6053 DNS Request for All Records

Info

Compound

No

Yes

Yes

Triggers on a DNS request for all records.

6054 DNS Version Request

Info

Compound

No

Yes

No

Triggers when a request for the version of a DNS server is detected.

6055 DNS Inverse Query Buffer Overflow

Attack

Atomic

No

Yes

No

Triggers when an IQUERY request arrives with a data section that is larger than 255 characters.

6056 DNS NXT Buffer Overflow

Attack

Compound

No

Yes

No

Triggers when a DNS server response arrives that has a long NXT resource in which the length of the resource data is greater than 2069 bytes or the length of the TCP stream containing the NXT resource is greater than 3000 bytes.

6057 DNS SIG Buffer Overflow

Attack

Compound

No

Yes

No

Triggers when a DNS server response arrives that has a long SIG resource in which the length of the resource data is greater than 2069 bytes or the length of the TCP stream containing the SIG resource is greater than 3000 bytes.

6062 DNS Authors Request

Info

Atomic

No

Yes

No

Triggers when a DNS query type TXT class CHAOS is detected with the string "Authors.Bind" (case-insensitive).

6063 DNS Incremental Zone Transfer

Info

Atomic

No

Yes

No

Triggers when a DNS query type of 251 is detected.

6100 RPC Port Registration

Info

Atomic

Yes

Yes

Yes

Triggers when attempts are made to register new RPC services on a target host.

6101 RPC Port Unregistration

Info

Atomic

Yes

Yes

Yes

Triggers when attempts are made to unregister existing RPC services on a target host.

6102 RPC Dump

Info

Atomic

Yes

Yes

Yes

Triggers when an RPC dump request is issued to a target host.

6103 Proxied RPC Request

Attack

Atomic

Yes

Yes

Yes

Triggers when a proxied RPC request is sent to a target host's portmapper.

6150 ypserv Portmap Request

Info

Atomic

Yes

Yes

Yes

Triggers when a request is made to the portmapper for the YP server daemon (ypserv) port.

6151 ypbind Portmap Request

Info

Atomic

Yes

Yes

Yes

Triggers when a request is made to the portmapper for the YP bind daemon (ypbind) port.

6152 yppasswdd Portmap Request

Info

Atomic

Yes

Yes

Yes

Triggers when a request is made to the portmapper for the YP password daemon (yppasswdd) port.

6153 ypupdated Portmap Request

Info

Atomic

Yes

Yes

Yes

Triggers when a request is made to the portmapper for the YP update daemon (ypupdated) port.

6154 ypxfrd Portmap Request

Info

Atomic

Yes

Yes

Yes

Triggers when a request is made to the portmapper for the YP transfer daemon (ypxfrd) port.

6155 Mountd Portmap Request

Info

Atomic

Yes

Yes

Yes

Triggers when a request is made to the portmapper for the mount daemon (mountd) port.

6175 rexd Portmap Request

Info

Atomic

Yes

Yes

Yes

Triggers when a request is made to the portmapper for the remote execution daemon (rexd) port.

6180 rexd Attempt

Info

Atomic

Yes

Yes

Yes

Triggers when a call to the rexd program is made. The remote execution daemon is the server responsible for remote program execution. This might indicate an attempt to gain unauthorized access to system resources.

6190 statd Buffer Overflow

Attack

Atomic

Yes

Yes

Yes

Triggers when a large statd request is sent. This could be an attempt to overflow a buffer and gain access to system resources.

8000 FTP Retrieve Password File

Attack

Atomic

Yes

Yes

No

Triggers on the string passwd issued during an FTP session. Might indicate someone attempting to retrieve the password file from a machine to crack it and gain unauthorized access to system resources.


You can also access interactive information about each signature using the following resources:

  • The Cisco Secure Encyclopedia (http://www.cisco.com/cgi-bin/front.x/csec/csecHome.pl) Follow the IDS Signatures link to find lists of links to complete signature information. A valid Cisco.com user ID is required.

  • CiscoWorks VMS Security Monitor Select the Monitor tab, and then select Events. Click Launch Event Viewer. Choose View > Network Security Database. You can click the Main link to see the full list of signatures. Figure 13-11 shows how the NSDB window appears.

    Figure 13-11. The Network Security Database Within CiscoWorks VMS


TIP

You can point a web browser directly to the Network Security Database maintained on the CiscoWorks VMS server. Use the URL https://vms-server/vms/nsdb/html/all_sigs_index.html, where vms-server is the server's IP address.


    team bbl



    Cisco ASA and PIX Firewall Handbook
    CCNP BCMSN Exam Certification Guide (3rd Edition)
    ISBN: 1587051583
    EAN: 2147483647
    Year: 2003
    Pages: 120
    Authors: David Hucaby

    flylib.com © 2008-2017.
    If you may any questions please contact us: flylib@qtcs.net