⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 2644.txt

📁 snort入侵检测规则文件2.4 Snort是众所周知的网络入侵检测工具
💻 TXT
字号:
Rule:--Sid:2644--Summary:This event is generated when an attempt is made to exploit a knownvulnerability in a Oracle database implementation.--Impact:Serious. Execution of arbitrary code may be possible. A Denial ofService (DoS) condition may also be caused.--Detailed Information:Oracle databases have a built-in function "from_tz" that is used toconvert the format of a timestamp. This function contains a programmingerror that may allow an attacker to execute a buffer overflow attack.This overflow is triggered by a long string in the second parameterof the function.If you are running Oracle on a Windows server, make sure that thevariable $ORACLE_PORTS is set to a value of "any".--Affected Systems:        Oracle 9i--Attack Scenarios:An attacker can supply a long string as the value for this command.The result could permit the attacker to gain escalated privileges andrun code of their choosing. This attack requires an attacker to logonto the database with a valid username and password combination.--Ease of Attack:Simple.--False Positives:None known.--False Negatives:None known.--Corrective Action:Ensure the system is using an up to date version of the software and hashad all vendor supplied patches applied.--Contributors:Sourcefire Vulnerability Research TeamMatt Watchinski <mwatchinski@sourcefire.com>Brian Caswell <bmc@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>Judy Novak <judy.novak@sourcefire.com>--Additional References:Other:http://www.nextgenss.com/advisories/ora_from_tz.txt--

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -