⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 714.txt

📁 snort入侵检测规则文件2.4 Snort是众所周知的网络入侵检测工具
💻 TXT
字号:
Rule:  resolv_host_conf"; flow:to_server,established;content:"resolv_host_conf"; reference:arachnids,369;reference:url,www.securityfocus.com/bid/2181; classtype:attempted-admin;sid:714; rev:4;) --Sid:714--Summary:The RESOLV_HOST_CONF variable is being manipulated on your Telnet host.--Impact:Elevated priviledges (file reads).--Detailed Information:The RESOLV_HOST_CONF variable, used by suid and sgid applications, isn'tproperly validated in some versions of glibc.  As a result, an attackercan use an suid or sgid root program to gain access to files they're notsupposed to have.--Affected Systems:UNIX systems with unpatched glibc 2.1.x or 2.2.x implementations.--Attack Scenarios:Attacker sets the RESOLVE_HOST_CONF variable to the filename of anyprotected file (for example, /etc/shadow), and then runs an suid or sgidroot program.  The contents of the protected file are then echoed to theconsole in a series of error messages.--Ease of Attack:Simple.--False Positives:None known.--False Negatives:None known.--Corrective Action:Install the latest vendor-supplied glibc implementation.--Contributors:Original Rule Writer UnknownSnort documentation contributed by Gene R Gomez (gene!AT!gomezbrothers!DOT!com)-- Additional References:Arachnids:http://www.whitehats.com/info/IDS369Bugtraq:http://www.securityfocus.com/bid/2181--

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -