⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 1158.txt

📁 snort入侵检测规则文件2.4 Snort是众所周知的网络入侵检测工具
💻 TXT
字号:
Rule:  --Sid:1158--Summary:This event is generated when an attempt is made to access the executablefile WindMail.exe using a web connection.--Impact:Remote attackers could subvert the WindMail mailer to read or executearbitrary files on the web server--Detailed Information:WindMail is a commandline mail program for Windows.  It is sometimesdeployed for scripting or for sending email through a web application.Some windmail deployments make webmail.exe a CGI application, which it wasnot designed to do.  The result is that an attacker could read orexecute arbitrary files on the system that the web server has access to.It should never be a CGI application itself, and instead should be calledby another program that properly filters input.--Affected Systems:	All systems using windmail.exe--Attack Scenarios:http://target/cgi-bin/windmail.exe?%20-n%20desired.file%20attacker_email_address--Ease of Attack:Simple crafting of a web GET request--False Positives:None Known--False Negatives:If a CGI script calls windmail.exe, but windmail.exe itself is not a CGIapplication, then this rule will not generate an event. If the CGIapplication does not properly filter input, there is a possibilitythat the attack could still succeed.--Corrective Action:Look at the packet to determine whether a request was made via an HTTP GETfor the windmail.exe application. If so, determine whether the attackedweb server had windmail.exe on it.--Contributors:Original rule writer unknownOriginal document author unkownSourcefire Vulnerability Research TeamNigel Houghton <nigel.houghton@sourcefire.com>--Additional References:--

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -