1806.txt
来自「This is the snapshot of Snot Latest Rule」· 文本 代码 · 共 62 行
TXT
62 行
Rule:--Sid:1806--Summary:This event is generated when an attempt is made to exploit a buffer overflow associated with chunked encoding processing of HTR in Internet Information Services (IIS). --Impact:Remote Access. If the exploit is successful, an attacker can gain remote access of the target host.--Detailed Information:A buffer overflow exists with chunked encoding processing associated with HTR in IIS. Chunked encoding allows different sized chunks of data to be passed from the web client to the server. HTR is an older scripting language still supported by IIS. A heap overflow vulnerability exists because of an error in chunked encoding data transfer associated with the Internet Services Application Programming Interface (ISAPI) extension that implements HTR.--Affected Systems:Microsoft IIS 4.0, 5.0 --Attack Scenarios:An attacker can craft a chunked encoded request to exploit the heap overflow.--Ease of Attack:Moderate. Microsoft advises that this heap overflow is not as difficult to exploit as others.--False Positives:None Known.--False Negatives:None Known.--Corrective Action:Apply the appropriate patch:Investigate running the IIS Lockdown Tool to disable HTR functionality.--Contributors:Original rule written by Brian Caswell <bmc@sourcefire.com>Sourcefire Vulnerability Research TeamJudy Novak <judy.novak@sourcefire.com>--Additional References:CVEhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0364Microsofthttp://www.microsoft.com/technet/security/bulletin/ms02-028.asp--
⌨️ 快捷键说明
复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?