📄 4129.txt
字号:
Rule:--Sid:4129--Summary:This event is generated when an attempt is made to exploit a known vulnerability in Novell ZenWorks Remote Management Agent.--Impact:Denial of Service (DoS).--Detailed Information:Novell ZenWorks Remote Management Agent suffers from a programming error that may allow a remote and unauthenticated attacker to corrupt memory space to the extent that a DoS condition will be manifest.The problem occurs because of insufficient checks on user supplied data prior to authentication. Excessive data may be supplied to the login process that is placed into a fixed length buffer, a classic buffer overflow condition is then met and the Agent may then suffer the DoS.Note:For this rule to generate an event correctly, port 1761 must be added to the stream4_reassemble line--Affected Systems:Novell ZENworks Server Management 6.5Novell ZENworks Remote ManagementNovell ZENworks for Servers 3.2Novell ZENworks for Desktops 4.0.1Novell ZENworks for Desktops 4.0Novell ZENworks for Desktops 3.2 SP2Novell ZENworks Desktop Management 6.5 --Attack Scenarios:An attacker can craft an overly large login request, causing a buffer overflow.--Ease of Attack:Simple. Exploits are publicly available.--False Positives:None known.--False Negatives:None known.--Corrective Action:Upgrade to the most current non-affected version of the product.Apply the appropriate vendor supplied patches.--Contributors:Sourcefire Vulnerability Research TeamAlex Kirk <akirk@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>--Additional References--
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -