⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 2253.txt

📁 This is the snapshot of Snot Latest Rules
💻 TXT
字号:
Rule:  --Sid:2253--Summary:This event is generated when an attempt is made to exploit a knownvulnerability in Microsoft Exchange Server.--Impact:Serious. Possible execution of arbitrary code and Denial of Service(DoS).--Detailed Information:A vulnerability exists in versions of Microsoft Exchange Server suchthat it is possible for an attacker to execute arbitrary code or cause aDoS condition on the server without the need for prior authentication asa valid user.It is possible for an attacker to connect to the Exchange server on port25 and send an extended verb request to the server that will cause alarge amount of memory to be allocated. In Exchange Server 5.5 this maycause a DoS, whilst in Exchange Server 2000 this same condition couldpresent the attacker with an opportunity to execute arbitrary code.--Affected Systems:	MIcrosoft Exchange Server 5.5	Microsoft Exchange Server 2000--Attack Scenarios:The attacker can connect to port 25 of the server and send a speciallycrafted verb request.--Ease of Attack:Simple.--False Positives:None known.--False Negatives:None known.--Corrective Action:Upgrade to the latest non-affected version of the software.Apply the appropriate vendor supplied patches.--Contributors:Sourcefire Vulnerability Research TeamBrian Caswell <bmc@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>-- Additional References:Microsoft Corp.http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS03-046.aspCVE:http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0714--

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -