⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 5316.txt

📁 This is the snapshot of Snot Latest Rules
💻 TXT
字号:
Rule: --Sid: 5316-- Summary: This event is generated when an attempt it made to exploit a known vulnerability in Computer Associates Message Queuing.-- Impact: Serious. Remote execution of code with system level privileges is possible.--Detailed Information:Multiple products from Computer Associates use a common messaging system. A programming error may permit an attacker to execute code of their choosing with system level privileges on a vulnerable system.The Computer Associates Message Queuing (CAM) system fails to properly check user supplied data. A long paramter passed to the log_security() function may allow an attacker to overflow a fixed length buffer and run code of their choosing on the target system.--Affected Systems:CA Unicenter prior to, and including 3.1CA eTrust Admin prior to, and including 8.1CA CleverPath Predictive Analysis Server prior to, and including 3.0CA CleverPath OLAP 5.1CA CleverPath ECM 3.5CA CleverPath Aion 10.0CA CAM prior to and including 1.11CA BrightStor SAN Manager  prior to and including 11.1CA BrightStor SAN Manager prior to and including 1.1 SP2CA BrightStor Portal 11.1CA AdviseIT 2.4CA Advantage Data Transport 3.0 --Attack Scenarios: An attacker can supply a long argument to the log_security() function and overflow the buffer.-- Ease of Attack: Simple. Exploit software exists.-- False Positives:None known.--False Negatives:None known-- Corrective Action: --Contributors:Sourcefire Vulnerability Research TeamJudy Novak <judy.novak@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>-- Additional References:--

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -