3003.txt
来自「This is the snapshot of Snot Latest Rule」· 文本 代码 · 共 71 行
TXT
71 行
Rule: --Sid:3003--Summary:This event is generated when an attempt is made to exploit a known vulnerability in the Microsoft implementation of the ASN.1 Library.--Impact:Serious. Execution of arbitrary code, DoS.--Detailed Information:A buffer overflow condition exists in the Microsoft implementation ofthe ASN.1 Library. It may be possible for an attacker to exploit thiscondition by sending specially crafted authentication packets to a hostrunning a vulnerable operating system.When the taget system decodes the ASN.1 data, exploit code may be included in the data that may be excuted on the host with system level privileges. Alternatively, the malformed data may cause the service to become unresponsive thus causing the DoS condition to occur.--Affected Systems: Microsoft Windows NT Microsoft Windows NT Terminal Server Edition Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows 2003--Ease of Attack:Simple. Exploit code exists.--False Positives:This rule is known to false positive on Active Directory and Domain Controllertraffic. If this event is being generated on traffic to a Domain Controller orActive Directory server it is recommended that this rule be disabled orsuppressed for that host.--False Negatives:None known.--Corrective Action:Apply the appropriate vendor supplied patches.--Contributors:Sourcefire Vulnerability Research TeamBrian Caswell <bmc@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>--Additional References:Microsoft:http://www.microsoft.com/security/encyclopedia/details.aspx?name=win32/rbotUS-CERThttp://www.us-cert.gov/cas/techalerts/TA04-041A.html--
⌨️ 快捷键说明
复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?