📄 3087.txt
字号:
Rule:--Sid:3087--Summary:This event is generated when an attempt is made to exploit a bufferoverflow in Microsoft Browser Client Context Tool (W3Who.dll).--Impact:Denial of service or remote access. If the exploit is successful,an attacker can gain remote access to the host with system privileges.--Detailed Information:W3Who is an Internet Server Application Programming Interface (ISAPI)application dynamic-link library (DLL) that works within a Web page todisplay information about the calling context of the client browser andthe configuration of the host server. W3Who is included in the Windows2000 Server Resource Kit.A boundary error within the processing of parameters can be exploitedto cause a buffer overflow by passing an overly long parameter.--Affected Systems:Microsoft IIS with W3Who.dll. (W3Who.dll is not automatically installedwith IIS.)--Attack Scenarios:An attacker can send a malformed HTTP request with an overly longparameter to W3Who DLL, subsequently causing a buffer overflow.--Ease of Attack:Simple--False Positives:Any overly large request URI with a reference to w3who.dll will bedetected.--False Negatives:This rule only detects the attack when the parameters are passedas part of the URI (GET method).--Corrective Action:Disable the W3Who.dll ISAPI extension.--Contributors:nnposter@users.sourceforge.net--Additional References:Microsoft:http://support.microsoft.com/default.aspx?scid=kb;en-us;Q323640--
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -