2411.txt
来自「snort入侵检测规则文件2.4 Snort是众所周知的网络入侵检测工具」· 文本 代码 · 共 67 行
TXT
67 行
Rule: --Sid:2411--Summary:This event is generated when an attempt is made to exploit a knownvulnerability in RealNetworks Helix Media Server.--Impact:Serious. Execution of arbitrary code is possible.--Detailed Information:Versions of RealNetworks Helix Media Server and RealSystem Server arevulnerable to a buffer overflow condition that may present the attackerwith the opportunity to execute code of their choosing on the targetsystem.This may then present the attacker with the opportunity to gain a remoteroot shell, thus compromising the system.--Affected Systems: Helix Universal Server 9.01, versions 9.0.2.794 and earlier RealSystem Server 8.0 & 7.0--Attack Scenarios:The attacker may probe for the existence of an affected server and thenuse one of the publicly available scripts to exploit the service.--Ease of Attack:Simple. Exploits exists.--False Positives:None known.--False Negatives:None known.--Corrective Action:Apply the appropriate vendor supplied patches.Upgrade to the latest non-affected version of the software.--Contributors:Sourcefire Research TeamMatt Watchinski <mwatchinski@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>-- Additional References:RealNetworkshttp://www.service.real.com/help/faq/security/rootexploit091103.html--
⌨️ 快捷键说明
复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?