⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 3017.txt

📁 snort入侵检测规则文件2.4 Snort是众所周知的网络入侵检测工具
💻 TXT
字号:
Rule: --Sid: 3017-- Summary: An oversized request was sent to a WINS server.-- Impact: Client-supplied data is written to client-specified locations in memory,allowing for arbitrary code execution. Since WINS servers run withadministrative privileges, this allows an attacker to gainadministrative access remotely without any prior authentication.--Detailed Information:Vulnerable WINS servers write client-supplied data to a client-suppliedmemory address. This allows clients to supply arbitrary code forexecution with administrative privileges. This attack does not require authentication.In order to reduce false positives, the rule looks for requests that aregreater than 204 bytes. As the maximum length of a hostname is 192bytes, and a standard request has 12 bytes of headers, no standardrequest should exceed this length. Additionally, this rule checks to seeif particular flags that are required to exploit this vulnerability areset in the client request.--Affected Systems:Microsoft Windows servers running the WINS service.--Attack Scenarios: Since WINS clients are programmed to not exceed the maximum length for arequest, an attacker would need to use a script which generatedmalformed WINS requests.-- Ease of Attack: Simple; exploits exist.-- False Positives:This rule will generate false positives when replication occurs.Additionally, there may be unknown scenarios which generate false positives.--False Negatives:None known.-- Corrective Action: See the Microsoft Knowledge Base article referenced below.--Contributors: Sourcefire Research TeamBrian Caswell <bmc@sourcefire.com>Alex Kirk <alex.kirk@sourcefire.com>-- Additional References:http://support.microsoft.com/kb/890710--

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -