⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 706.txt

📁 snort入侵检测规则文件2.4 Snort是众所周知的网络入侵检测工具
💻 TXT
字号:
Rule:--Sid:706--Summary:This event is generated when an attempt is made to exploit a vulnerability in Microsoft SQL Server and Data Engine.--Impact:Serious. Full system compromise is possible.--Detailed Information:A buffer overflow condition in the xp_peekqueue variable exists which may allow the execution of an arbitary command with administrative priviledge.The vulnerability occurs in API Srv_paraminfo(), which is implemented byExtended Stored Procedures (XPs) in Microsoft SQL Server and Data Engine. It may also be possible for attackers to execute arbitrary code on the host running SQL Server. --Affected Systems: Microsoft SQL Server 7.0 Microsoft SQL Server 2000  Microsoft Data Engine 1.0 Microsoft Data Engine 2000   --Attack Scenarios:An attacker can pass an overly long string to the XP xp_peekqueue,a buffer overflow can occur due to an unsafe memory copy. This can causeSQL Server to crash.--Ease of Attack:Simple. Exploit scripts are available.--False Positives:None known--False Negatives:None known--Corrective Action: Apply the appropriate vendor supplied patch(Microsoft Patch Q280380 , Microsoft Patch Q280380)--Contributors:Original Rule Writer UnknownNawapong Nakjang (tony@ksc.net, tonie@thai.com)Sourcefire Research TeamNigel Houghton <nigel.houghton@sourcefire.com>--Additional References:Bugtraq:http://www.securityfocus.com/bid/2040/--

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -