4638.txt

来自「This is the snapshot of Snot Latest Rule」· 文本 代码 · 共 58 行

TXT
58
字号
Rule:--Sid: 4638-- Summary: This event is generated when an attempt is made to exploit a known vulnerability in Tcpdump. In particular, this event indicates that the exploit was attempted via a malformed Resource Reservation Protocol (RSVP) packet.-- Impact: Serious. Denial of Service (DoS). Code execution may be possible.--Detailed Information:Tcpdump is a packet capture utility used on various BSD, Linux and UNIX style operating systems.An error in the processing of the payload length in an RSVP packet may prevent an attacker with the opportunity to overflow a fixed length buffer and execute code of their choosing in the context of the user running tcpdump. This is normally the super-user or administrator when tcpdump is used to sniff data directly from a network interface.--Affected Systems:	Tcpdump 3.9.1 and prior	Tcpdump 3.8.3 and prior--Attack Scenarios: An attacker need to craft an RSVP packet with a packet payload length of 0 to cause the overflow to manifest itself.-- Ease of Attack: Simple.-- False Positives:None Known--False Negatives:None Known-- Corrective Action: Apply the appropriate vendor supplied patchUpgrade to the latest non-affected version of the software.--Contributors: Sourcefire Vulnerability Research TeamAlex Kirk <akirk@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>-- Additional References:--

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?