📄 3679.txt
字号:
Rule:--Sid:3679--Summary:This event is generated when an attempt is made to exploit avulnerability associated with Mozilla Firefox when processing the IFRAMEtag.--Impact:A successful attack may permit execution of arbitrary code on avulnerable client.--Detailed Information:A vulnerability exists in the way Mozilla Firefox handles the valuesupplied to the IFRAME tag "src" keyword. Ordinarily the "src" keywordis used to supply the the URL of the document to display in the newframe created by the IFRAME tag. However, if supplied malciousjavascript, it is possible to execute arbitrary code on a vulnerableclient.--Affected Systems: Mozilla Firefox 1.0.3 and previous versions Mozilla Suite 1.7.7 and previous versions--Attack Scenarios:An attacker can entice a user to visit a malicious website that canexecute arbitrary code on a vulnerable client.--Ease of Attack:Simple. Exploits exist.--False Positives:None known.--False Negatives:In order to avoid potential evasion techniques, http_inspect should beconfigured with "flow_depth 0" so that all HTTP server response trafficis inspected.WARNINGSetting flow_depth 0 will cause performance problems in some situations.WARNING--Corrective Action:Upgrade to the most current non-affected version of the product.--Contributors:Sourcefire Research TeamJudy Novak <judy.novak@sourcefire.com>Brian Caswell <bmc@sourcefire.com>--Additional References--
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -