⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 5739.txt

📁 This is the snapshot of Snot Latest Rules
💻 TXT
字号:
Rule: --Sid: 5739-- Summary: This event is generated when a server response indicating that a message has been received with overly long mail headers, has been detected.-- Impact: Possible code execution.--Detailed Information:A race condition exists in versions of Sendmail, this vulnerability may allow a remote attacker to execute code of their choosing on an affected server.A programming error in the way that sendmail handles asynchronous signals may allow an attacker to overflow a fixed length buffer by supplying a large amount of data in an email header. This event indicates that a mail server has returned a messages indicating that it recieved a message with a long mail header.--Affected Systems:Sendmail prior to version 8.1.3--Attack Scenarios: An attacker could send extra data in an email header to overflow a fixed length buffer and execute code of their choosing.-- Ease of Attack: Simple.-- False Positives:None known.--False Negatives:None known.-- Corrective Action: Apply the appropriate vendor supplied patches.Upgrade to the latest non-affected version of the software.--Contributors:Sourcefire Vulnerability Research Team-- Additional References:--

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -