659.txt
来自「This is the snapshot of Snot Latest Rule」· 文本 代码 · 共 51 行
TXT
51 行
Rule:--Sid:659--Summary:This event is generated when a probe is sent to an SMTP server to determine if the decode alias is supported.--Impact:Intelligence gathering activity. This event could be an indication of reconnaissance or an actual attempt to overwrite a sensitive file. If the decode alias is present on the SMTP server, an attacker may use it to overwrite files. --Detailed Information:The decode alias was included to allow email to be sent to a username of decode to process the email content through the uudecode program. A malicious user could attempt to email a uuencoded file that would overwrite an existing sensitive file. --Affected Systems:Older UNIX Sendmail versions (~1990-1996)--Attack Scenarios:An attacker can email a uuencoded file to the decode username to overwrite an existing sensitive file. --Ease of Attack:Simple. Send email containing a uuencoded file to the username decode to overwrite an existing sensitive file.--False Positives:None Known.--False Negatives:None Known.--Corrective Action:Remove decode in /etc/aliases.--Contributors:Original rule written by Max Vision <vision@whitehats.com>Sourcefire Vulnerability Research TeamJudy Novak <judy.novak@sourcefire.com>--Additional References:--
⌨️ 快捷键说明
复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?