106-5.txt
来自「This is the snapshot of Snot Latest Rule」· 文本 代码 · 共 57 行
TXT
57 行
Rule:--Sid:106-5--Summary:This event is generated when the pre-processor spp_rpc_decode detects network traffic that may constitute an attack. Specifically an rpc fragment with a zero length was detected.--Impact:Possible Denial of Service.--Detailed Information:This event is generated when the spp_rpc_decode pre-processor detects network traffic that may consititute an attack.Some NFS daemons may suffer a denial of service (DoS) when they encounter RPC fragments with the length field set to zero.--Affected Systems:NFS Servers--Attack Scenarios:An attacker would need to supply RPC fragmented data to the server and set the fragment length to zero to cause the DoS to occur.--Ease of Attack:Simple.--False Positives:None Known.--False Negatives:None Known.--Corrective Action:Check the target host for signs of compromise.Apply any appropriate vendor supplied patches.--Contributors:Sourcefire Vulnerability Research TeamNigel Houghton <nigel.houghton@sourcefire.com>--Additional References:--
⌨️ 快捷键说明
复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?