⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 3664.txt

📁 This is the snapshot of Snot Latest Rules
💻 TXT
字号:
Rule:--Sid:3664--Summary:The Point to Point Tunneling Protocol (PPTP) is used to connect client machines to internal corporate resources using a Virtual Private Network(VPN) across a public network such as the Internet via an encrypted session. Specifically an attempt to overflow a fixed length buffer inthe PoPToP daemon.--Impact:Serious. Execution of code with root privileges may be possible.--Detailed Information:A vulnerability in the PoPToP daemon may allow an attacker to overflow afixed length buffer when processing user supplied data.Specifically, the user supplied "length" variable is not properlychecked before being used in a calculation to determine the amount ofdata to be received. It is possible to manipulate the variable so thatit returns a negative value. This value can then be used to overwriteportions of system memory with code of the attackers choosing.--Affected Systems:	PoPToP Server 1.1.3 and prior	PoPToP Server 1.1.4-b2 and prior--Attack Scenarios:Exploits are publicly available.--Ease of Attack:Simple--False Positives:None Known--False Negatives:None Known--Corrective Action:--Contributors:Sourcefire Vulnerability Research TeamAlex Kirk <akirk@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>--Additional References:--

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -