📄 2664.txt
字号:
Rule:--Sid:2664--Summary:This event is generated when a remote attacker attempts to exploit a format string vulnerability against an IMAP server.--Impact:Serious. A successful format string attack could result in theexecution of arbitrary code with the same privileges as the user runningthe IMAP daemon.--Detailed Information:Some versions of the Courier IMAP daemon are vulnerable to format stringexploits prior to and during authentication to the IMAP server. Asuccessful exploit attempt could result in the remote attacker gainingunauthorized root access to a vulnerable system.--Affected Systems: Courier IMAP server versions 1.6 though 3.0.2--Attack Scenarios:A remote attacker could use a publicly available script to exploit the vulnerability an gain control of the target host.--Ease of Attack:Simple. Exploit code is available.--False Positives:This rule may generate an event if the password for a valid user contains the character "%".--False Negatives:None known.--Corrective Action:Upgrade to the latest non-affected version of the software.--Contributors:Sourcefire Vulnerability Research TeamMatt Watchinski <mwatchinski@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>--Additional References:--
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -