⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 12670.txt

📁 This is the snapshot of Snot Latest Rules
💻 TXT
字号:
Rule:--Sid:12670--Summary:This event is generated when an attempt is made to exploit a known vulnerability in an ActiveX control.--Impact:A successful attack can cause a buffer overflow and the subsequent execution of arbitrary code with system level privileges on a vulnerable host.--Detailed Information:A vulnerability exists in the way that Internet Explorer handles ActiveX controls that may present an attacker with the opportunity to run code of their choosing on a host.In particular, this event is generated when a call to the  is made. This may indicate an attempt to exploit known vulnerabilities in that ActiveX control which may lead to a system compromise.Stack-based buffer overflow in the Database Component in MPAMedia.dll in RealNetworks RealPlayer 10.5 and 11 beta allows remote attackers to execute arbitrary code, as demonstrated via the import method to the IERPCtl ActiveX control in ierpplug.dll.--Affected Systems:Microsoft Windows systems using the  ActiveX control--Attack Scenarios:An attacker can host a web site that will return code of their choosing to the object when a victim clicks on a malicious link.--Ease of Attack:Simple.--False Positives:None known.--False Negatives:None known.--Corrective Action:Upgrade to the most current non-affected version of the product.--Contributors:This document was generated from data supplied by the National Vulnerability Database. A product of the National Institute of Standards and Technology.For more information see http://nvd.nist.gov/Sourcefire Vulnerability Research TeamAlex Kirk <akirk@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>--Additional References--

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -