📄 3536.txt
字号:
Rule:--Sid:3536--Summary:This event is generated when an attempt is made to exploit aheap overflow associated with Mozilla's processing of amalformed GIF file.--Impact:A successful attack can cause a heap overflow on the client hostrunning Mozilla and permit execution of arbitrary code at theprivilege level of the current user.--Detailed Information:The Mozilla browser can read images from a file formatted inGraphics Interchange Format (GIF). The GIF format has optional"extension blocks" that supply additional information to abrowser that can interpret and render it.An optional application block is one type of extension block.There is a vulnerability with particular sub-blocks associatedwith the application block that permits a signed variable thatshould contain a positive value to be treated as a negativenumber. This may cause a heap overflow.In order to avoid potential evasion techniques, http_inspectshould be configured with "flow_depth 0" so that all HTTPserver response traffic is inspected.WARNINGSetting flow_depth 0 will cause performance problems in some situations.WARNING--Affected Systems: Mozilla Firefox and Thunderbird 1.0.1 and prior Mozilla browser 1.7.5 and prior--Attack Scenarios:An attacker can entice a user to download a malicious GIF filethat causes an overflow, enabling execution of arbitrary codeon a vulnerable client.--Ease of Attack:Simple. Exploit code is available.--False Positives:None known.--False Negatives:A malicious value found in any sub-block but the first willnot trigger an alert.--Corrective Action:Upgrade to the most current non-affected version of the product.--Contributors:Sourcefire Research TeamBrian Caswell <bmc@sourcefire.com>Judy Novak <judy.novak@sourcefire.com>--Additional ReferencesOther:--
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -