⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 2883.txt

📁 snort入侵检测规则文件2.4 Snort是众所周知的网络入侵检测工具
💻 TXT
字号:
Rule: --Sid: 2883-- Summary: This event is generated when an attempt is made to exploit a knownvulnerability in an Oracle database server.-- Impact: Serious. Possible execution of arbitrary code and Denial of Service.--Detailed Information:This event is generated when an attempt is made to exploit a knownvulnerability in an Oracle database implementation. Multiple bufferoverflow conditions are present in numerous packages and procedures.Exploitation of these vulnerable procedures may allow an attacker toexecute code of their choosing as the user running the database. In thecase of databases running on Microsoft Windows platforms, this is theLocal System account which may mean a compromise of the operating systemas well as the database.This event indicates that an attempt has been made to exploit avulnerability in the procedure comment_on_unique_resolution. This procedure is included insys.dbms_repcat_conf.--Affected Systems:	Oracle Oracle9i--Attack Scenarios: If an attacker can supply enough data to the procedure in question, itmay be possible to cause the overflow condition to occur and present theattacker with the opportunity to execute code of their choosing.-- Ease of Attack: Simple.-- False Positives:None Known--False Negatives:None Known-- Corrective Action: Apply the appropriate vendor supplied patch--Contributors: Sourcefire Research TeamBrian Caswell <bmc@sourcefire.com>Alex Kirk <alex.kirk@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>-- Additional References:--

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -