📄 1518.txt
字号:
Rule:--Sid:1518--Summary:This event is generated when an attempt is made to access the filenstelemetry.adp on a web server.--Impact:Information gathering.--Detailed Information:Access to nstelemetry.adp may indicate that a malicious user is trying toexploit a well known vulnerability in AOLserver that allows the attacker to readpassword protected files.This event is generated when an attempt is made to compromise a hostrunning a Web server or a vulnerable application on a web server.Many known vulnerabilities exist for each implementation and the attack scenarios are legion.Some applications do not perform stringent checks when validating thecredentials of a client host connecting to the services offered on ahost server. This can lead to unauthorized access and possibly escalatedprivileges to that of the administrator. Data stored on the machine canbe compromised and trust relationships between the victim server and other hosts can be exploited by the attacker.--Affected Systems: AOLServer.--Attack Scenarios:Many attack vectors are possible from simple directory traversal toexploitation of buffer overflow conditions.--Ease of Attack:Simple. Exploits exist.--False Positives:None known.--False Negatives:None known.--Corrective Action:Ensure the system is using an up to date version of the software and hashad all vendor supplied patches applied.Check the host logfiles and application logs for signs of compromise.--Contributors:Sourcefire Research TeamBrian Caswell <bmc@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>--Additional References:--
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -