⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 2404.txt

📁 This is the snapshot of Snot Latest Rules
💻 TXT
字号:
Rule:--Sid:2404--Summary:This event is generated when an attempt is made to exploit a known vulnerability in ISS RealSecure and BlackICE products.--Impact:Serious. Execution of arbitrary code, DoS.--Detailed Information:A buffer overflow condition in the ISS Analysis Module can be triggered by an attacker sending a single SMB packet containing an AccountName greater than 300 bytes. It is possible for an attacker to exploit this condition by sending a specially crafted packet to a host serving network shares.When the systems running one of the affected ISS products decodes the SMB data, exploit code may be included and executed on the machine with system level privileges. Alternatively, the malformed data may cause the service to become unresponsive and cause a DoS condition.Sensors under attack will display "PAM_internal_error" as a message on the console.Successful exploitation of this issue could present an attacker with the  opportunity to execute code of their choosing on the target host with system privileges. It is also possible for a Denial of Service (DoS) condition to be caused by an attacker attempting to exploit this condition.--Affected Systems:RealSecure Network 7.0, XPU 20.15 through 22.9Real Secure Server Sensor 7.0 XPU 20.16 through 22.9Proventia A Series XPU 20.15 through 22.9Proventia G Series XPU 22.3 through 22.9Proventia M Series XPU 1.3 through 1.7RealSecure Desktop 7.0 eba through ebhRealSecure Desktop 3.6 ebr through ecbRealSecure Guard 3.6 ebr through ecbRealSecure Sentry 3.6 ebr through ecbBlackICE PC Protection 3.6 cbr through ccbBlackICE Server Protection 3.6 cbr through ccb--Attack Scenarios:An attacker may use this vulnerability to disable ISS sensors on a network or potentially use it to gain control of a machine running one of the affected products.--Ease of Attack:Simple.--False Positives:Data transfer between a Windows 2003 file server and other Windows based machines may cause this rule to generate events in some circumstances. Ensure that the HOME_NET and EXTERNAL_NET variables are correctly set inthe snort.conf file to negate the effects of file transfers on local subnets.--False Negatives:None known.--Corrective Action:Apply the appropriate vendor supplied patches.--Contributors:Sourcefire Vulnerability Research TeamBrian Caswell <bmc@sourcefire.com>Matt Watchinski <mwatchinski@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>--References:--

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -