⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 2329.txt

📁 snort入侵检测规则文件2.4 Snort是众所周知的网络入侵检测工具
💻 TXT
字号:
Rule:--Sid:2329--Summary:This event is generated when an attempt is made to exploit a knownvulnerability in Microsoft Windows Data Access Components.--Impact:Serious. Execution of arbitrary code is possible. Denial of Service(DoS)--Detailed Information:It may be possible for an attacker to send a specially crafted responseto a client broadcast query searching for an SQL server. This responsecould take advantage of a buffer overrun condition in an MDAC componentwhich may result in the attacker being presented with the opportunity to execute code of their choosing with the privileges of the user runningthe service on the client system.A DoS condition may also manifest in MDAC version 2.8.MDAC is included by default on many Microsoft Windows systems. Clientworkstations may make regular broadcast announcements in an attempt tofind SQL servers.--Affected Systems:	Microsoft Data Access Components 2.5	Microsoft Data Access Components 2.6	Microsoft Data Access Components 2.7	Microsoft Data Access Components 2.8--Attack Scenarios:The attacker may spoof the response from an SQL server to exploit thevulnerability.--Ease of Attack:Moderate..--False Positives:Since this rule cannot be constrained using ports and the connectionstate for MSDAC is not tracked, false positive events may occur undernormal circumstances. The $SQL_SERVERS variable in snort.conf should beconfigured correctly to eliminate this behavior.--False Negatives:None known--Corrective Action:Apply the appropriate vendor supplied patches and service packs.Disallow access to database servers from sources external to theprotected network.Disallow access to database servers from untrusted hosts.--Contributors:Sourcefire Research TeamBrian Caswell <bmc@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>--Additional References:--

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -