📄 1196.txt
字号:
Rule: --Sid:1196--Summary:This event is generated when an attempt is made to exploit a knownvulnerability in the IRIX infosrch.cgi web application.--Impact:Execution of code of the attackers choosing is possible.--Detailed Information:sgi IRIX 6.5 through 6.5.7 ships with a web application called InfoSearchthat is vulnerable to a remote execution attack.An attacker may have abused the infosrch.cgi web application that shipswith IRIX 6.5 to remotely execute arbitrary commands as the webserver user.--Affected Systems: SGI IRIX 6.5 to 6.5.7 --Attack Scenarios:An attacker uses an existing, publically known exploit script, orsends a simple, handcrafted URL to the webserver such as:http://target/cgi-bin/infosrch.cgi?cmd=getdoc&db=man&fname=|/bin/id--Ease of Attack:Simple. Exploits exist.--False Positives:The InfoSearch web application may legitimately be used to browse systemdocumentation.--False Negatives:None Known--Corrective Action:Examine the packet to determine whether malicious code was contained inthe fname HTTP GET variable, such as unix shell commands. If it lookslike it may have been malicious code, determine whether the targettedweb server was running a vulnerable version of IRIX.Upgrade to the latest non-affected version of the product.Apply the appropriate vendor supplied patches.--Contributors:Original rule writer unknownOriginal document author unkownSourcefire Vulnerability Research TeamNigel Houghton <nigel.houghton@sourcefire.com>--Additional References:--
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -