3017.txt
来自「This is the snapshot of Snot Latest Rule」· 文本 代码 · 共 73 行
TXT
73 行
Rule: --Sid: 3017-- Summary: An oversized request was sent to a WINS server.-- Impact: Client-supplied data is written to client-specified locations in memory,allowing for arbitrary code execution. Since WINS servers run withadministrative privileges, this allows an attacker to gainadministrative access remotely without any prior authentication.--Detailed Information:Vulnerable WINS servers write client-supplied data to a client-suppliedmemory address. This allows clients to supply arbitrary code forexecution with administrative privileges. This attack does not require authentication.In order to reduce false positives, the rule looks for requests that aregreater than 204 bytes. As the maximum length of a hostname is 192bytes, and a standard request has 12 bytes of headers, no standardrequest should exceed this length. Additionally, this rule checks to seeif particular flags that are required to exploit this vulnerability areset in the client request.--Affected Systems:Microsoft Windows servers running the WINS service.--Attack Scenarios: Since WINS clients are programmed to not exceed the maximum length for arequest, an attacker would need to use a script which generatedmalformed WINS requests.-- Ease of Attack: Simple; exploits exist.-- False Positives:This rule will generate false positives when replication occurs.Additionally, there may be unknown scenarios which generate false positives.--False Negatives:None known.-- Corrective Action: See the Microsoft Knowledge Base article referenced below.--Contributors: Sourcefire Vulnerability Research TeamBrian Caswell <bmc@sourcefire.com>Alex Kirk <alex.kirk@sourcefire.com>-- Additional References:http://support.microsoft.com/kb/890710Microsoft:http://www.microsoft.com/security/encyclopedia/details.aspx?name=Win32/Wootbot--
⌨️ 快捷键说明
复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?