📄 3526.txt
字号:
Rule:--Sid:3526--Summary:This event is generated when an attempt is made to exploit a vulnerabilityassociated with the Oracle XML Database (XDB) FTP UNLOCK command.--Impact:A successful attack may allow arbitrary commands to be executed on avulnerable server by an authenticated user.--Detailed Information:The Oracle XDB UNLOCK command is vulnerable to a buffer overflowattack. A fixed size buffer is allocated for a parameter associatedwith the command. A user-supplied parameter value that is longer thanthe allocated buffer can cause a buffer overflow and allow the subsequentexecution of arbitrary commands on a vulnerable server. It should benoted that valid credentials must be supplied for authentication and accessto the server.--Affected Systems:Oracle 9.2.0.1--Attack Scenarios:An attacker can craft an UNLOCK command and supply it an overly longparameter.--Ease of Attack:Simple. Exploits exist.--False Positives:None known.--False Negatives:None known.--Corrective Action:Upgrade to the most current non-affected version of the product.--Contributors:Sourcefire Vulnerability Research TeamJudy Novak <judy.novak@sourcefire.com>--Additional References:Variations in Exploit methods between Linux and Windows - David Litchfield:http://www.blackhat.com/presentations/bh-usa-03/bh-us-03-litchfield-paper.pdf--
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -