📄 2411.txt
字号:
Rule: --Sid:2411--Summary:This event is generated when an attempt is made to exploit a knownvulnerability in RealNetworks Helix Media Server.--Impact:Serious. Execution of arbitrary code is possible.--Detailed Information:Versions of RealNetworks Helix Media Server and RealSystem Server arevulnerable to a buffer overflow condition that may present the attackerwith the opportunity to execute code of their choosing on the targetsystem.This may then present the attacker with the opportunity to gain a remoteroot shell, thus compromising the system.--Affected Systems: Helix Universal Server 9.01, versions 9.0.2.794 and earlier RealSystem Server 8.0 & 7.0--Attack Scenarios:The attacker may probe for the existence of an affected server and thenuse one of the publicly available scripts to exploit the service.--Ease of Attack:Simple. Exploits exists.--False Positives:None known.--False Negatives:None known.--Corrective Action:Apply the appropriate vendor supplied patches.Upgrade to the latest non-affected version of the software.--Contributors:Sourcefire Research TeamMatt Watchinski <mwatchinski@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>-- Additional References:RealNetworkshttp://www.service.real.com/help/faq/security/rootexploit091103.html--
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -