⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 3130.txt

📁 snort入侵检测规则文件2.4 Snort是众所周知的网络入侵检测工具
💻 TXT
字号:
Rule:--Sid:3130--Summary:This alert is generated when a malicious PNG file is sent to an MSN Messengerclient. Vulnerable clients which receive such a file are vulnerable to remotecode execution attacks.--Impact:Arbitrary code may be executed in the context of the user running MSN Messenger.Their messenger client may or may not crash, depending upon the way the PNG fileis written.--Detailed Information:This vulnerability is due to a buffer overflow in the processing of tRNS chunksof PNG files. In order to trigger the overflow, the color type field of the IHDRchunk must be set to 0x03, and the length of the tRNS chunk must be greater than256. --Affected Systems:	MSN Messenger 6.1	MSN Messenger 6.2--Attack Scenarios:An attacker may send a malicious PNG through a direct file transfer, as athumbnail for a file transfer, as a custom emoticon, or by setting their buddyicon to be the malicious PNG. In all cases, the PNG is sent via an MSN filetransfer.--Ease of Attack:Very simple. Example PNGs with shellcode are available on the web, and attackingvia all but the file transfer thumbnail vector is accomplished with simple,everyday MSN Messenger tasks.--False Positives:None Known.--False Negatives:Thumbnails of image transfers are sent in an encoded format. As a result, theycannot be detected. However, making the thumbnail contain malicious data isexponentially more difficult than any of the other attack vectors, as anattacker cannot manually specify the thumbnail to be sent.--Corrective Action:Apply the appropriate vendor supplied patch.--Contributors:Sourcefire Research TeamAlex Kirk <alex.kirk@sourcefire.com>--Additional References:--

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -