📄 4142.txt
字号:
Rule:--Sid:4142--Summary:This event is generated when an attempt is made to exploit a knownvulnerability in an Oracle database application implementation.--Impact:A successful attack can present an unauthorized attacker with theopportunity to run commands on an affected system.--Detailed Information:A vulnerability exists in the way that Oracle executes reports. It ispossible for an attacker to run any executable report that exists in anylocation on the affected host.The Oracle reports application does not properly sanitize user input, anattacker can supply a full path to an executable report on the systemand execute the file in the context of the user running the application.In the case of Microsoft systems, this is the administrator account.--Affected Systems: Oracle 6.0, 6i, 9i, 10g--Attack Scenarios:An attacker would need to upload a report file of their choosing on tothe affected victim server and then use the vulnerability to executethat report and run any command on the system.--Ease of Attack:Simple.--False Positives:None known.--False Negatives:None known.--Corrective Action:Upgrade to the most current non-affected version of the product.--Contributors:Sourcefire Vulnerability Research TeamNigel Houghton <nigel.houghton@sourcefire.com>--Additional References--
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -