⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 1888.txt

📁 snort入侵检测规则文件2.4 Snort是众所周知的网络入侵检测工具
💻 TXT
字号:
Rule:--Sid:1188--Summary:This event is generated when an attempt is made to exploit a knownvulnerability in WS_FTP.--Impact:Serious. Execution of arbitrary code is possible.--Detailed Information:Executing  site cpwd with an specially crafted argument can cause a bufferoverflow in WS_FTP that would allow arbitrary code to be run on the ftpserver.The 'site cpwd' command seems to be unique to ws_ftp. This command is usedto allow users to change there passwords while using an ftp session. It ispossible to execute 'site cpwd' with an specially crafted argument can causea buffer overflow in WS_FTP. This would allow arbitrary code to be run onthe ftp server. This requires that the user be logged into the ftp serverbefore executing the 'site cpwd' command.--Affected Systems:	WS_FTP up to an including 3.12--Attack Scenarios:An attacker needs to authenticate to an ftp server running the affectedsoftware then supply a specially crafted command to cause the bufferoverflow condition to occur.--Ease of Attack:Simple.--False Positives:'site cpwd' is a valid command on ws_ftp and users may be allowed to changetheir passwords.--False Negatives:None Known--Corrective Action:Upgrade to the latest non-affected version of the software.Apply the appropriate vendor supplied patches.Consider using scp as a secure replacement for ftp.--Contributors:Original rule writer unknownSnort documentation contributed by Ian MacdonaldSourcefire Vulnerability Research TeamNigel Houghton <nigel.houghton@sourcefire.com>--Additional References:--

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -