2126.txt

来自「This is the snapshot of Snot Latest Rule」· 文本 代码 · 共 58 行

TXT
58
字号
Rule:--Sid:2126--Summary:This event is generated when a remote attacker attempts to overflow Microsoft's PPTP RAS service.  --Impact:Administrative Compromise.  This attack may permit executation of arbitrary commands with the privileges of the NT SYSTEM account.--Detailed Information:A buffer overflow exists when a malformed SCR (Start Control Request) PPTP  packet is received by the PPTP RAS service.  This may permit executation of arbitrary commands with the privileges of the administrator account.--Affected Systems:Windows 2000 ProfessionalWindows 2000 ServerWindows 2000 Advanced Server--Attack Scenarios:Exploit code can be used to attack vulnerable PPTP RAS services to obtain SYSTEM level access to the remote host.--Ease of Attack:Difficult.  Currently Sourcefire is unaware of any publicly available exploits for this vulnerability.--False Positives:PPTP clients that violate RFC2637 by generating overly long Host Name and Vendor Strings could potentially trigger this rule inadvertently.--False Negatives:None Known.--Corrective Action:Apply the appropriate vendor supplied patches.--Contributors:Sourcefire Vulnerability Research TeamMatthew Watchinski (matt.watchinski@sourcefire.com)--Additional References:CVE:http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1214--

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?