5712.txt
来自「This is the snapshot of Snot Latest Rule」· 文本 代码 · 共 57 行
TXT
57 行
Rule:--Sid:5712--Summary:This event is generated when an attempt has been made to exploit a known vulnerability in Windows Media Player. --Impact:Serious. Possible remote code execution.--Detailed Information:This event indicates that an attempt has been made to exploit a known vulnerability in Windows Media Player. Windows Media Player suffers from a programming error that may enable an attacker to run code of their choosing on a vulnerable system. The error occurs when processing malformed bitmap files with the application. A bitmap file with an invalid data offset can allow an attacker to overflow a fixed length buffer and execute code of their choosing on an affected host. --Affected Systems:All Microsoft Windows systems using Media Player --Attack Scenarios:An attacker can craft the special bitmap image and execute code of their choosing when processed with Media Player.--Ease of Attack:Simple. Exploit code exists.--False Positives:None known.--False Negatives:None known.--Corrective Action:Apply the appropriate vendor supplied patchesDo not use media player as the default application for viewing media types--Contributors:Sourcefire Vulnerability Research TeamMatt Watchinski <matthew.watchinski@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>--Additional References:--
⌨️ 快捷键说明
复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?