⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 2589.txt

📁 snort入侵检测规则文件2.4 Snort是众所周知的网络入侵检测工具
💻 TXT
字号:
Rule:--Sid:2589--Summary:This event is generated when an attempt is made to return toa web client a file in the Content-Disposition Header with aClass ID (CLSID) embedded in the file name.--Impact:A successful attack may trick a client on a vulnerable host to downloada malicious file that will be executed by the Windows Shell.--Detailed Information:Internet Explorer does not correctly handle or display speciallycrafted files in the browser dialogue where the user choses theaction (e.g., open, save, cancel) for a downloaded file.Specifically, these are overly long file names that employ URLencoding of "." %2E before the file extension and contain theClass ID (CLSID) associated with the Windows Shell in the file name.This serves two purposes; the first is that the file name willbe truncated in the user dialog so the user doesn't see theCLSID reference, making it appear to be a more innocuous filewith a known extension such as mpg or pdf.  Second, the downloadedfile will actually contain malcious commands that will beexecuted by the Windows Shell when opened because of the hiddenCLSID in the file name.Currently, the only known CLSID that exploits this vulnerabilityis associated with the Windows Shell.  Yet, it may be possiblefor another CLSID to be discovered in the future that would beassociated with a COM component that could be used for maliciouspurposes.--Affected Systems:	Windows NT Workstation/Server 4.0 SP6a	Windows NT Workstation/Server 4.0 SP6a with Active Desktop	Windows NT Server 4.0 Terminal Server Edition SP6	Windows 2000 SP2-SP4	Windows XP and XP SP1	Windows XP 64-Bit Edition SP1	Windows XP 64-Bit Edition Version 2003	Windows Server 2003	Windows Server 2003 64-Bit Edition--Attack Scenarios:An attacker can entice a user to visit a web server thatwill return a malicious file with a file name that containsa CLSID, perhaps enabling the execution of the maliciouscode when the file is opened.--Ease of Attack:Simple. Exploit code is publicly available.--False Positives:None known.--False Negatives:None known.--Corrective Action:Upgrade to the latest non-affected version of the software.--Contributors:Sourcefire Research TeamBrian Caswell <bmc@sourcefire.com>Judy Novak <judy.novak@sourcefire.com>--Additional ReferencesCVE:http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0420Bugtraq:http://www.securityfocus.com/bid/9510Other:http://www.microsoft.com/technet/security/bulletin/ms04-024.mspx--

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -