⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 3526.txt

📁 snort入侵检测规则文件2.4 Snort是众所周知的网络入侵检测工具
💻 TXT
字号:
Rule:--Sid:3526--Summary:This event is generated when an attempt is made to exploit a vulnerabilityassociated with the Oracle XML Database (XDB) FTP UNLOCK command.--Impact:A successful attack may allow arbitrary commands to be executed on avulnerable server by an authenticated user.--Detailed Information:The Oracle XDB UNLOCK command is vulnerable to a buffer overflowattack.  A fixed size buffer is allocated for a parameter associatedwith the command.  A user-supplied parameter value that is longer thanthe allocated buffer can cause a buffer overflow and allow the subsequentexecution of arbitrary commands on a vulnerable server.  It should benoted that valid credentials must be supplied for authentication and accessto the server.--Affected Systems:Oracle 9.2.0.1--Attack Scenarios:An attacker can craft an UNLOCK command and supply it an overly longparameter.--Ease of Attack:Simple. Exploits exist.--False Positives:None known.--False Negatives:None known.--Corrective Action:Upgrade to the most current non-affected version of the product.--Contributors:Sourcefire Vulnerability Research TeamJudy Novak <judy.novak@sourcefire.com>--Additional References:Variations in Exploit methods between Linux and Windows - David Litchfield:http://www.blackhat.com/presentations/bh-usa-03/bh-us-03-litchfield-paper.pdf--

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -