⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 343.txt

📁 This is the snapshot of Snot Latest Rules
💻 TXT
字号:
SID:343--Rule:--Summary:This event is generated when an attack attempt is made against an ftp server possibly running a vulnerable ftpd running on FreeBSD--Impact:Possible remote execution of commands on the affected server as the root user--Detailed Information:The Washington University ftp daemon (wu-ftpd) does not perform proper checking in its SITE EXEC implementation, and allows user input to be sent directly to printf. This allows an attacker to overwrite data and eventually execute code on the server.--Affected Systems:Any system running wu-ftpd 2.6 .0 or below--Attack Scenarios:A remote attacker will attempt to execute commands on the ftp server with root user privileges, over writing or modifying system files. This can be done with anonymous and real user logins.--Ease of Attack:Simple, Exploits exist--False Positives:None known--False Negatives:None known--Corrective Action:Upgrade to latest version which has fixes for this problem. Maybe even get rid of wu-ftp with something more secure--Contributors:Snort documentation contributed by matthew harvey <indexone@yahoo.com>Original Rule Writer UnknownSourcefire Research TeamNigel Houghton <nigel.houghton@sourcefire.com>--References:--

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -