6502.txt
来自「This is the snapshot of Snot Latest Rule」· 文本 代码 · 共 64 行
TXT
64 行
Rule:--Sid:6502--Summary:This event is generated when an attempt is made to exploit a heap overflow associated with Mozilla's processing of a malformed GIF file.--Impact:A successful attack can cause a heap overflow on the client host running Mozilla and permit execution of arbitrary code at the privilege level of the current user.--Detailed Information:The Mozilla browser can read images from a file formatted in Graphics Interchange Format (GIF). The GIF format has optional "extension blocks" that supply additional information to a browser that can interpret and render it.An optional application block is one type of extension block. There is a vulnerability with particular sub-blocks associated with the application block that permits a signed variable that should contain a positive value to be treated as a negative number. This may cause a heap overflow.NOTEIn order to avoid potential evasion techniques, http_inspect should be configured with "flow_depth 0" so that all HTTP server response traffic is inspected.NOTEWARNINGSetting flow_depth 0 will cause performance problems in some situations.WARNING--Affected Systems:Mozilla Firefox and Thunderbird 1.0.1 and priorMozilla browser 1.7.5 and prior--Attack Scenarios:An attacker can entice a user to download a malicious GIF file that causes an overflow, enabling execution of arbitrary code on a vulnerable client.--Ease of Attack:Simple. Exploit code is available.--False Positives:None known.--False Negatives:A malicious value found in any sub-block but the first will not trigger an alert.--Corrective Action:Upgrade to the most current non-affected version of the product.--Contributors:Sourcefire Vulnerability Research TeamBrian Caswell <bmc@sourcefire.com>Judy Novak <judy.novak@sourcefire.com>--Additional References--
⌨️ 快捷键说明
复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?