1772.txt

来自「This is the snapshot of Snot Latest Rule」· 文本 代码 · 共 66 行

TXT
66
字号
Rule:--Sid:1772--Summary:This event is generated when an attempt is made to access thepbserver.dll component associated with the Microsoft Phone Book Service. --Impact:Remote access. Malicious access of the pbserver.dll component can allowthe execution of arbitrary commands on a vulnerable server.--Detailed Information:The Microsoft Phone Book Service allows dial-in clients to downloadphone book updates from the Internet Information Server (IIS) runningthe Phone Book Service.  The pbserver.dll is the Internet ServicesApplication Programming Interface (ISAPI) that implements the updateservice.  A buffer overflow exists in pbserver.dll that may permit theexecution of arbitrary commands on the server. --Affected Systems:	Windows NT 4.0	Windows 2000 Server--Attack Scenarios:An attacker can craft an HTTP request for a phone book update to a hostrunning the Phone Book Service.--Ease of Attack:Simple. Exploit code is available.--False Positives:None Known.--False Negatives:None Known.--Corrective Action:Delete pbserver.dll if the Phone Book Service is unnecessary. Apply the appropriate vendor supplied patches.Upgrade to the latest non-affected version of the software.--Contributors:Sourcefire Vulnerability Research TeamBrian Caswell <bmc@sourcefire.com>Judy Novak <judy.novak@sourcefire.com>--Additional References:--

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?