3526.txt

来自「This is the snapshot of Snot Latest Rule」· 文本 代码 · 共 65 行

TXT
65
字号
Rule:--Sid:3526--Summary:This event is generated when an attempt is made to exploit a vulnerabilityassociated with the Oracle XML Database (XDB) FTP UNLOCK command.--Impact:A successful attack may allow arbitrary commands to be executed on avulnerable server by an authenticated user.--Detailed Information:The Oracle XDB UNLOCK command is vulnerable to a buffer overflowattack.  A fixed size buffer is allocated for a parameter associatedwith the command.  A user-supplied parameter value that is longer thanthe allocated buffer can cause a buffer overflow and allow the subsequentexecution of arbitrary commands on a vulnerable server.  It should benoted that valid credentials must be supplied for authentication and accessto the server.--Affected Systems:Oracle 9.2.0.1--Attack Scenarios:An attacker can craft an UNLOCK command and supply it an overly longparameter.--Ease of Attack:Simple. Exploits exist.--False Positives:None known.--False Negatives:None known.--Corrective Action:Upgrade to the most current non-affected version of the product.--Contributors:Sourcefire Vulnerability Research TeamJudy Novak <judy.novak@sourcefire.com>--Additional References:Variations in Exploit methods between Linux and Windows - David Litchfield:http://www.blackhat.com/presentations/bh-usa-03/bh-us-03-litchfield-paper.pdf--

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?