⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 2031.txt

📁 snort入侵检测规则文件2.4 Snort是众所周知的网络入侵检测工具
💻 TXT
字号:
Rule:--Sid:2031--Summary:The rpc.ypasswd service is used to update user information remotely. This service should not be available outside the local area network, external source.--Impact:This may be an intelligence gathering activity on available rpc serviceson a machine connected to external resources. The possibility also exists that an attacker may already have gained access to a NIS server and thus all resources connected to that host.--Detailed Information:A vulnerability exists in some versions of the rpc.ypasswd service thatcan lead to a remote root compromise of a vulnerable host. This activitymay be an intelligence gathering exercise to ascertain wether or not thehost is vulnerable to this attack.This activity may also indicate a possible compromise of a NIS server via a legitimate user account the attacker has previously garnered. Compromise of a master NIS server may present the attacker with easy access to all NIS resources the machine is connected to.--Affected Systems:All systems running the rpc.ypasswd service.--Attack Scenarios:The attacker can make a request to update user information via rpc.ypasswd.--Ease of Attack:Simple--False Positives:None Known--False Negatives:None Known--Corrective Action:Disable the rpc.ypasswd daemon.Disallow all RPC requests from external sources and use a firewall to block access to RPC ports from outside the LAN.--Contributors:Sourcefire Research TeamBrian Caswell <bmc@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>--Additional References:SANS:http://www.sans.org/rr/unix/NIS.phphttp://www.sans.org/rr/unix/sec_solaris.php--

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -