3679.txt

来自「This is the snapshot of Snot Latest Rule」· 文本 代码 · 共 70 行

TXT
70
字号
Rule:--Sid:3679--Summary:This event is generated when an attempt is made to exploit avulnerability associated with Mozilla Firefox when processing the IFRAMEtag.--Impact:A successful attack may permit execution of arbitrary code on avulnerable client.--Detailed Information:A vulnerability exists in the way Mozilla Firefox handles the valuesupplied to the IFRAME tag "src" keyword.  Ordinarily the "src" keywordis used to supply the the URL of the document to display in the newframe created by the IFRAME tag. However, if supplied malciousjavascript, it is possible to execute arbitrary code on a vulnerableclient.--Affected Systems:	Mozilla Firefox 1.0.3 and previous versions	Mozilla Suite 1.7.7 and previous versions--Attack Scenarios:An attacker can entice a user to visit a malicious website that canexecute arbitrary code on a vulnerable client.--Ease of Attack:Simple. Exploits exist.--False Positives:High potential for false positives.This rule is disabled by default.--False Negatives:In order to avoid potential evasion techniques, http_inspect should beconfigured with "flow_depth 0" so that all HTTP server response trafficis inspected.WARNINGSetting flow_depth 0 will cause performance problems in some situations.WARNING--Corrective Action:Upgrade to the most current non-affected version of the product.--Contributors:Sourcefire Vulnerability Research TeamJudy Novak <judy.novak@sourcefire.com>Brian Caswell <bmc@sourcefire.com>--Additional References--

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?