⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 8530.txt

📁 This is the snapshot of Snot Latest Rules
💻 TXT
字号:
Rule:--Sid:8530--Summary:This event is generated when an attempt is made to exploit a known vulnerability in Microsoft systems using Microsoft SQL Server.--Impact:Serious. Denial of Service. Code execution may be possible.--Detailed Information:Microsoft SQL Server is a database platform for use on hosts using the Microsoft Windows operating system.A vulnerability in the handling of functions available through the Extended Stored Procedures API may allow an attacker to overflow a fixed length buffer and execute code of their choosing on an affected host. A DoS condition may also result due to the server failing to handle a memory copy routine properly which may cause the server to crash.In particular this rule generates an event when an attempt is made to exploit the function "MS-SQL/SMB xp_showcolv".--Affected Systems:Microsoft Windows SQL Server 2000--Attack Scenarios:An attacker can supply extra data in the message to the server via the function MS-SQL/SMB xp_showcolv to cause the overflow condition to occur. --Ease of Attack:Simple. Exploit code exists.--False Positives:None known.--False Negatives:None known.--Corrective Action:Apply the appropriate vendor supplied patches.Use MySQL, Oracle or PostGRES as alternative database engines.--Contributors:Sourcefire Vulnerability Research TeamBrian Caswell <bmc@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>--Additional References:Microsoft 10 Steps to Help Secure SQL Server 2000https://www.microsoft.com/sql/prodinfo/previousversions/securingsqlserver.mspx--

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -