⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 2079.txt

📁 This is the snapshot of Snot Latest Rules
💻 TXT
字号:
Rule:--Sid:2079--Summary:This event is generated when an attempt is made to exploit a known vulnerability in the rpc service lockd.--Impact:Intelligence gathering--Detailed Information:This may be an attacker probing for vulnerable versions of rpc services. In this case, the rpc service lockd.If a user connects to port 1024 being used by the rpc service lockd, a denial of service can be issued by supplying random input to the service. This is an attempt to ascertain whether or not that attack could be successful.--Affected Systems:Debian Linux 2.1, 2.2 pre potato and 2.2MandrakeSoft Linux Mandrake 6.0, 6.1 and 7.0RedHat Linux 6.0 sparc, i386 and alphaRedHat Linux 6.1 sparc, i386 and alphaRedHat Linux 6.2 sparc, i386 and alpha--Attack Scenarios:The attacker needs to send random data to port 1024 used by nlockmgr.--Ease of Attack:Simple--False Positives:None Known--False Negatives:None Known--Corrective Action:Apply the appropriate patches for the system.Upgrade the software to the latest non vulnerable version.--Contributors:Sourcefire Vulnerability Research TeamBrian Caswell <bmc@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>--Additional References:CVE:http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0508--

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -