Guest

Cisco Security

Cisco Security

SMB Remote SAM Service Access Attempt

 
Signature ID: 5583/0
Original Release:S262
Release:S633 (download)
Original Release Date:2006 December 15
Latest Release Date:2012 March 16
Default Enabled:False
Default Retired:True
Alarm Severity:Informational
Fidelity:100 

Description

This signature indicates that an attempt has been made to access the SAM security service on a Windows system. This service may be used to gain system information that would be useful in launching subsequent attacks. Access and browsing via this service is an integral portion of the so called Red Button attack.This signature obsoletes signature 3311-0.

Recommended Filter

There are no suggested filters.

Benign Triggers

This is normal traffic on Windows networks and is included as an informational signature. This type of traffic is more suspicious when the source is external to the local network.

IntelliShield Alerts

IntelliShield ID Headline VersionCVSS ScoreLast Published
31Microsoft Windows NT User List Information Disclosure12000 May 01 16:00 GMT
1145Server Message Block Protocol Share Enumeration Denial of Service Vulnerability12007 May 01 02:51 GMT

Download

To download this and other IPS update files, please go to Cisco Secure Software Download.

LEGAL DISCLAIMER
THE INFORMATION ON THIS PAGE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION CONTAINED HEREIN, OR MATERIALS LINKED FROM THE DOCUMENT, IS AT YOUR OWN RISK. INFORMATION IN THIS DOCUMENT AND ANY RELATED COMMUNICATIONS IS BASED ON OUR KNOWLEDGE AT THE TIME OF PUBLICATION AND IS SUBJECT TO CHANGE WITHOUT NOTICE. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.
Powered by  IntelliShield