📄 124-1.txt
字号:
Rule:--Sid:124-1--Summary:This event is generated when the pre-processor xlink2statedetects network traffic that may constitute an attack. Specifically thisevent is generated when an attempt is made to overflow a static bufferassociated with the extended verb "X-LINK2STATE" in a possible attemptto exploit a known vulnerability in Microsoft Exchange Server.--Impact:Execution of arbitrary code leading to full administrator access of the machine. Denial of Service (DoS).--Detailed Information:Microsoft Exchange Servers are able to use extensions to the SMTPprotocol to help communicate between Exchange servers. The"X-Link2State" verb is used to share routing information betweenExchange servers.A buffer overflow condition in the processing of this command maypresent an attacker with the opportunity to execute code of theirchoosing on an affected host.While some of the extended verbs can be disabled easily by anAdministrator, this particular command cannot. The affected dynamic linklibrary (DLL) must be unregistered. Refer to MS05-021 for details on howto unregister the DLL.--Affected Systems: Microsoft Exchange Server 2000 sp3 Microsoft Exchange Server 2003 Microsoft Exchange Server 2003 sp1--Attack Scenarios:An attacker can supply a malicious verb request using the "X-Link2State"verb to cause a buffer overflow.--Ease of Attack:Simple. Exploit code exists.--False Positives:This event will generate events in an environment where the use ofextended verbs between Exchange servers is commonplace.--False Negatives:None known.--Corrective Action:Apply the appropriate vendor supplied patches.Disable the use of the Microsoft SMTP extensions.--Contributors:Sourcefire Vulnerability Research TeamBrian Caswell <bmc@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>--Additional References:--
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -