⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 3519.txt

📁 snort入侵检测规则文件2.4 Snort是众所周知的网络入侵检测工具
💻 TXT
字号:
Rule: --Sid: 3519-- Summary: This event is generated when an overly long password is sent to the MySQL MaxDB WebSQL service, in an attempt to cause a buffer overflow.-- Impact: Successful attacks against a vulnerable version of this service cause a buffer to be overflowed. The service will crash, and an attacker may be able to execute arbitrary code with the privileges of the web server.--Detailed Information:A password value of 294 bytes or more is sufficient to crash vulnerable versions of the service. This value is sent as part of an HTTP POST operation. This rule searches for exploits on port 9999, the default for the server.--Affected Systems:	MySQL AB MaxDB 7.5.00	MySQL AB MaxDB 7.5.00.08	MySQL AB MaxDB 7.5.00.11	MySQL AB MaxDB 7.5.00.12	MySQL AB MaxDB 7.5.00.14	MySQL AB MaxDB 7.5.00.15	MySQL AB MaxDB 7.5.00.16--Attack Scenarios: This vulnerability may be exploited using a web browser, or an automated script.-- Ease of Attack: Simple; can be performed via the standard web interface of the vulnerable application.-- False Positives:None Known--False Negatives:None Known-- Corrective Action: Upgrade to the latest non-affected version of the software.Apply the appropriate vendor supplied patches.--Contributors: Sourcefire Vulnerability Research TeamAlex Kirk <alex.kirk@sourcefire.com>-- Additional References:--

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -