116-5.txt
来自「This is the snapshot of Snot Latest Rule」· 文本 代码 · 共 57 行
TXT
57 行
Rule:--Sid:116-5--Summary:This event is generated when the pre-processor snort_decoder detects network traffic that may constitute an attack. Specifically a truncated ipv4 options was detected.--Impact:Unknown.--Detailed Information:This event is generated when the snort_decoder pre-processor detects network traffic that may consititute an attack.Exploitation attempts against hosts using the Microsoft Windows operating system will cause this event to be generated. See MS05-019 for details regarding this issue.--Affected Systems:All.--Attack Scenarios:--Ease of Attack:Simple.--False Positives:None Known.--False Negatives:None Known.--Corrective Action:Check the target host for signs of compromise.Apply any appropriate vendor supplied patches.--Contributors:Sourcefire Vulnerability Research Team--Additional References:MS05-019http://www.microsoft.com/technet/security/bulletin/MS05-019.mspx--
⌨️ 快捷键说明
复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?