⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 2552.txt

📁 snort入侵检测规则文件2.4 Snort是众所周知的网络入侵检测工具
💻 TXT
字号:
Rule: --Sid: 2552-- Summary: This event is generated when an attempt is made to exploit a knownvulnerability in Oracle Application Server Web Cache.-- Impact: Serious. Possible execution of arbitrary code leading to remoteadministrative access.--Detailed Information:The Oracle Application Server Web Cache is vulnerable to a bufferoverrun caused by poor checking of the length of an HTTP Header. If alarge invalid HTTP Request Method is supplied to a vulnerable system, anattacker may be presented with the opportunity to overrun a fixed lengthbuffer and subsequently execute code of their choosing on the server.--Affected Systems:Oracle Application Server Web Cache 10g 9.0.4 .0Oracle Oracle9i Application Server Web Cache 2.0 .0.4Oracle Oracle9i Application Server Web Cache 9.0.2 .3Oracle Oracle9i Application Server Web Cache 9.0.2 .2Oracle Oracle9i Application Server Web Cache 9.0.3 .1--Attack Scenarios: An attacker might supply an HTTP Request Method of more than 432 bytes,causing the overflow to occur.-- Ease of Attack: Simple.-- False Positives:None Known--False Negatives:This rule examines Oracle Web Cache server on port 7777 or 7778.  It is possibleto configure the Oracle Web Cache server to run on different ports.  The ruleshould be configured to reflect the appropriate ports of Oracle Web Cacheservers on your network.-- Corrective Action: Apply the appropriate vendor supplied patch--Contributors: Sourcefire Research TeamJudy Novak <judy.novak@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>-- Additional References:--

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -