3693.txt

来自「This is the snapshot of Snot Latest Rule」· 文本 代码 · 共 52 行

TXT
52
字号
Rule:--Sid:3693--Summary:This event is generated when an attempt is made to exploit a buffer overflow associated with the IBM WebSphere Application Server mishandling of authentication variable values.--Impact:A successful attack can cause a buffer overflow on a vulnerable IBM WebSphere server, permitting the execution of arbitrary code on the vulnerable server.--Detailed Information:IBM WebSphere may use form-based authentication to permit access to applications.  The CGI variables j_username and j_password are used for this authentication process.  Overly long values passed to these variables can cause a buffer overflow and the subsequent execution of arbitrary code on the vulnerable server.  This is due to a failure in the code to accommodate wide-character expansion for the receiving buffer.--Affected Systems:IBM WebSphere Application Server 5.0 through 5.0.2 without Cumulative Fix 11--Attack Scenarios:An attacker can send a malformed request that contains an overly long value for a vulnerable authentication variable.--Ease of Attack:Simple.--False Positives:None known.--False Negatives:None known.--Corrective Action:Upgrade to the most current non-affected version of the product.--Contributors:Sourcefire Vulnerability Research TeamJudy Novak <judy.novak@sourcefire.com>--Additional References--

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?