⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 3552.txt

📁 snort入侵检测规则文件2.4 Snort是众所周知的网络入侵检测工具
💻 TXT
字号:
Rule: --Sid: 3552-- Summary: This event is generated when an attempt is made to exploit a knownvulnerability in Microsoft Windows.-- Impact: Serious. Code execution may be possible.--Detailed Information:Microsoft Windows has design errors that may enable an attacker toexecute code of their choosing on a vulnerable system. Specifically, itis possible to execute code from objects not marked as executable.Microsoft OLE2 allows objects to be executed by integratingapplications. The Class ID (CLSID) of an object allows objects to beloaded by multiple applications. This CLSID is embedded in the objectand may be manipulated by an attacker to force an application intoexecuting code of the attackers choosing.Specifically, the CLSID can be made to point at the Microsoft HTMLApplication Host (MSHTA). MSHTA.EXE will process each line of a file andexecute any script code it finds.--Affected Systems:	All versions of Microsoft Windows--Attack Scenarios: An attacker could modify the CLSID of a document and provide a link tothe victim who could then access and execute the code without beingaware of what has happened.-- Ease of Attack: Difficult.-- False Positives:None known.--False Negatives:None known.-- Corrective Action: Apply the appropriate vendor supplied patchUpgrade to the latest non-affected version of the software.--Contributors:Sourcefire Vulnerability Research TeamBrian Caswell <bmc@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>-- Additional References:iDefense:http://www.idefense.com/application/poi/display?id=231&type=vulnerabilitiesMicrosoft:http://www.microsoft.com/technet/security/bulletin/MS05-016.mspx--

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -