10136.txt

来自「This is the snapshot of Snot Latest Rule」· 文本 代码 · 共 53 行

TXT
53
字号
Rule--Sid10136--Summary:This event is generated when an attempt is made to exploit a known vulnerability in .--Impact:High--Detailed Information:Argument injection vulnerability in the telnet daemon (in.telnetd) in Solaris 10 and 11 (SunOS 5.10 and 5.11) misinterprets certain client "-f" sequences as valid requests for the login program to skip authentication, which allows remote attackers to log into certain accounts, as demonstrated by the bin account.--Affected Systems:  10.0--Attack Scenarios:--Ease of Attack:--False Positives:None known.--False Negatives:None known.--Corrective Action:--Contributors:Sourcefire Vulnerability Research TeamThis document was generated from data supplied by the National Vulnerability Database. A product of the National Institute of Standards and Technology.For more information see http://nvd.nist.gov/--Additional References:--

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?