📄 3146.txt
字号:
Rule: --Sid: 3146-- Summary: This event is generated when an attempt is made to exploit a knownvulnerability in Microsoft systems using Server Message Block (SMB).-- Impact: Serious. Execution of arbitrary code leading to unauthorizedadministrative access to the target host. Denial of Service (DoS) isalso possible.--Detailed Information:SMB is a client - server protocol used in sharing resources such asfiles, printers, ports, named pipes and other things, between machineson a network.A vulnerability in the Microsoft implementation of SMB exists due to aprogramming error which may present an attacker with the opportunity toexploit the service and run code of their choosing on an affectedsystem. The attacker may then cause a DoS condition in the service orpossibly gain unauthorized access to the target host.A malicious attacker can exploit the vulnerability by sending amalicious response from a server in response to a client request usingSMB.--Affected Systems: Microsoft Windows 2003 Microsoft Windows 2000 Microsoft Windows XP--Attack Scenarios: An attacker can supply extra data in the message from the servercontaining code of their choosing to be run on the client.-- Ease of Attack: Simple.-- False Positives:None known.--False Negatives:None known.-- Corrective Action: Apply the appropriate vendor supplied patches.Turn off windows file and print services.Use Samba as an alternative.--Contributors: Sourcefire Vulnerability Research TeamBrian Caswell <bmc@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>-- Additional References:eEye:http://www.eeye.com/html/research/advisories/AD20050208.html--
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -