2021.txt

来自「This is the snapshot of Snot Latest Rule」· 文本 代码 · 共 70 行

TXT
70
字号
Rule:--Sid:2021--Summary:The RPC service mountd enables clients to connect to networked file dismounted via UDP.--Impact:Denial of network resources to users on the local area network.--Detailed Information:This may be an attempt to deny access to network resources from an unauthorized source. It may also be indicative of an attacker probing for RPC services on a host in an attempt to discover a possible entry point to network resources via a vulnerable daemon.--Affected Systems:All systems allowing network shares to be unmounted by anonymous hosts, all systems allowing RPC services to be stopped by ordinary users and systems already compromised by an attacker via another vulnerability.--Attack Scenarios:This is an intelligence gathering activity, the attacker could remotely unmount a shared resource to deny a resource to the local area network or a probe to discover possible routes of entry into a system.--Ease of Attack:Simple--False Positives:None Known--False Negatives:None Known--Corrective Action:When allowing hosts to mount an external network share, consider using ahosts.allow file.Do not allow shares to be unmounted by unauthorized hosts or users.RPC services should not be available outside the local area network, filter RPC ports at the firewall to ensure access is denied to RPC enabled machines.RPC services should also be disabled where not needed.--Contributors:Sourcefire Vulnerability Research TeamBrian Caswell <bmc@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>--Additional References:--

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?