⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 5319.txt

📁 This is the snapshot of Snot Latest Rules
💻 TXT
字号:
Rule:--Sid:5319--Summary:This event is generated when an attempt is made to exploit a known vulnerability in Microsoft Windows systems via the graphics rendering engine. Specifically, this event is generated when the Metasploit framework is used in an attempt to exploit the vulnerability.--Impact:A successful attack may result in the execution of code of the attackers choosing possibly leading to control of the target machine.--Detailed Information:The Microsoft Windows graphics rendering engine does not correctly parse windows metafile (wmf) format files. As a result, viewing a corrupted file may present an attacker with the opportunity to execute code of their choosing. This vulnerability is associated with the SetAbortProc function that can be called from a WMF.NOTEIn order to avoid potential evasion techniques, http_inspect should be configured with "flow_depth 0" so that all HTTP server response traffic is inspected.NOTEWARNINGSetting flow_depth 0 will cause performance problems in some situations.WARNING--Affected Systems:Microsoft Windows 98Microsoft Windows MEMicrosoft Windows 2000Microsoft Windows XPMicrosoft Windows Server 2003--Attack Scenarios:An attacker can craft a malicious wmf file and cause the target host user to view the file.--Ease of Attack:Simple. Exploit code is publicly available.--False Positives:This rule will generate false positives since it is very generic in nature. For this reason the normal state of this rule is disabled.--False Negatives:None known.--Corrective Action:Upgrade to the latest non-affected version of the software.Apply the appropriate vendor supplied patches as they become available.--Contributors:Sourcefire Vulnerability Research TeamBrian Caswell <bmc@sourcefire.com>Judy Novak <judy.novak@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>-Additional ReferencesMicrosoft Windows Metafiles:http://msdn.microsoft.com/library/default.asp?url=/library/en-us/gdi/metafile_7ulv.asp--

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -