📄 2522.txt
字号:
Rule:--Sid:2522--Summary:This event is generated when an attempt is made to exploit a knownvulnerability in the Microsoft implementation of SSL Version 3.--Impact:Denial of Service (DoS).--Detailed Information:A vulnerability exists in the handling of SSL Version 3 requests thatcan be manipulated to cause a DoS condition in various software implementations used on Microsoft operating systems.The condition exists because of poor error handling routines in theMicrosoft Secure Sockets Layer (SSL) library. SSL requests containing aninvalid field, sent to vulnerable systems can cause the affected host to stop handling any further requests.--Affected Systems: Microsoft Windows 2000, 2003 and XP systems using SSL--Attack Scenarios:An attcker needs to make an SSL request to an affected system thatcontains an invalid field.--Ease of Attack:Simple.--False Positives:None known.--False Negatives:The no_stream keyword was added to this rule to fix a number ofknown false positives. This however, introduces a false negativepossibility. If an attacker tcp segments the SSL Client Helloit will now no longer be reassembled.The reason for this change is the high number of false positivescreated by how the stream reassembler was assembling the firstand second client packets during an SSL negotiation.Example.Packet 1 - Client Hello - 50 bytesPacket 2 - Server Hello (from server)Packet 3 - Key Exchange - 250 bytesPacket 4 - Key Exhcnage (from server)Packet 5 - Data from clientIn the normal case packet 1 is much larger than 50 bytes. However,some SSL/VPN solutions send out very small Client Hello messages.This creates a situation where Packet 1 and Packet 3 are reassembledto create a 300 byte packet which is inspected by the detection engineThis create the following problem:Packet 1 - Set the flow bit for client hello in this rulePacket 2 - Sets the flow bit for server hello in this rule.Packet 3 - Forces a reassemble to occur and the detection engineinspects Packet 1+3. This causes the rule to fire as the flowbitsare set and the reassembled packet looks like a second invalid Client Hello message.--Corrective Action:Apply the appropriate vendor supplied patches--Contributors:Sourcefire Vulnerability Research TeamMatt Watchinski <mwatchinski@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>--Additional References:Microsoft:http://www.microsoft.com/security/encyclopedia/details.aspx?name=Win32/Gaobothttp://www.microsoft.com/security/encyclopedia/details.aspx?name=Win32/Sasserhttp://www.microsoft.com/security/encyclopedia/details.aspx?name=Win32/Korgohttp://www.microsoft.com/security/encyclopedia/details.aspx?name=win32/rbothttp://www.microsoft.com/security/encyclopedia/details.aspx?name=Win32/Sdbothttp://www.microsoft.com/security/encyclopedia/details.aspx?name=Win32/Mytobhttp://www.microsoft.com/security/encyclopedia/details.aspx?name=Win32/Spybothttp://www.microsoft.com/security/encyclopedia/details.aspx?name=Win32/Wootbot--
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -