⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 3000.txt

📁 snort入侵检测规则文件2.4 Snort是众所周知的网络入侵检测工具
💻 TXT
字号:
Rule:  --Sid:3000--Summary:This event is generated when an attempt is made to exploit a known vulnerability in the Microsoft implementation of the ASN.1 Library.--Impact:Serious. Execution of arbitrary code, DoS.--Detailed Information:A buffer overflow condition in the Microsoft implementation of the ASN.1 Library. It may be possible for an attacker to exploit this condition by sending specially crafted authentication packets to a host running a vulnerable operating system.When the taget system decodes the ASN.1 data, exploit code may be included in the data that may be excuted on the host with system level privileges. Alternatively, the malformed data may cause the service to become unresponsive thus causing the DoS condition to occur.--Affected Systems:	Microsoft Windows NT	Microsoft Windows NT Terminal Server Edition	Microsoft Windows 2000	Microsoft Windows XP	Microsoft Windows 2003--Ease of Attack:Simple. Exploit code exists.--False Positives:None known.--False Negatives:None known.--Corrective Action:Apply the appropriate vendor supplied patches.--Contributors:Sourcefire Research TeamBrian Caswell <bmc@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>--References:CVEhttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0818US-CERThttp://www.us-cert.gov/cas/techalerts/TA04-041A.htmlMicrosofthttp://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/ms04-007.asp--

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -