⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 3485.txt

📁 snort入侵检测规则文件2.4 Snort是众所周知的网络入侵检测工具
💻 TXT
字号:
Rule:--Sid:3485--Summary:This event is generated when an attempt is made to exploit abuffer overflow associated with BrightStor ARCserve backupclient message processing.--Impact:A successful attack can cause a buffer overflow and thesubsequent execution of arbitrary code with system levelprivileges on a vulnerable server.--Detailed Information:A vulnerability exists in the way that a the BrightStor ARCservediscovery service processes client messages.  Client productinformation messages and client slot information messages that containan overly long client name or client domain value cancause the buffer overflow. The discovery service can listen on TCP port41523 and UDP port 41524.--Affected Systems:	Computer Associates BrightStor ARCserver Backup 9.x - 11.x--Attack Scenarios:An attacker can craft a malformed message with a spoofedclient IP address, causing a buffer overflow.--Ease of Attack:Simple.  Exploits are publicly available.--False Positives:None known.--False Negatives:None known.--Corrective Action:Upgrade to the most current non-affected version of the product.--Contributors:Sourcefire Research TeamJudy Novak <judy.novak@sourcefire.com>--Additional References--

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -