3078.txt
来自「This is the snapshot of Snot Latest Rule」· 文本 代码 · 共 67 行
TXT
67 行
Rule: --Sid:3078--Summary:This event is generated when an attempt is made to exploit a knownvulnerability in Microsoft implementation of the Network News TransportProtocol (NNTP) for Internet Information Server (IIS).--Impact:Execution of arbitrary code on the affected system--Detailed Information:The Microsoft implementation of NNTP for IIS contains a programmingerror in the processing of user supplied input that may present anattacker with multiple opportunites to execute code of their choosing onan affected system.--Affected Systems:. Microsoft Windows NT Server 4.0 NNTP component. Microsoft Windows 2000 Server NNTP component. Microsoft Windows Server 2003 NNTP Component. Microsoft Windows Server 2003 64-Bit Edition NNTP Component--Attack Scenarios:An attacker must supply specially crafted input to a vulnerable systemto cause the overflow to occur.--Ease of Attack:Moderate. Example code exists.--False Positives:None known--False Negatives:None known--Corrective Action:Apply the appropriate vendor supplied patchesUpgrade to the latest non-affected version of the software--Contributors:Sourcefire Vulnerability Research TeamBrian Caswell <bmc@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>-- Additional References:CORE Technologies:http://www.coresecurity.com/common/showdoc.php?idx=420&idxseccion=10--
⌨️ 快捷键说明
复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?