1811.txt

来自「snort入侵检测规则文件2.4 Snort是众所周知的网络入侵检测工具」· 文本 代码 · 共 64 行

TXT
64
字号
Rule:--Sid:1811--Summary:This event is generated when a remote user has exploited a flaw in a local SSH server.--Impact:Serious--Detailed Information:OpenSSH has a flaw in the challenge-response mechanism when configured with either the "PAMAuthenticationViaKbdInt" or the "ChallengeResponseAuthentication" options. This flaw can be exploited bya user who is not authenicated and can lead to the attacker obtaining a root shell.--Affected Systems:OpenSSH versions 1.2 to 3.3, Solaris 9.0, IBM Linux Affinity Toolkit, and HP HP-UX Secure Shell A.03.10.--Attack Scenarios:An attacker can cause the service to restart or hang, leaving the service unavailable to users.--Ease of Attack:Simple. Exploit code available.--False Positives:None Known--False Negatives:None Known--Corrective Action:Upgrade to latest version of OpenSSH--Contributors:Sourcefire Research TeamBrian Caswell <bmc@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>Snort documentation contributed by Josh Sakofsky-- Additional References:Bugtraq:http://www.securityfocus.com/bid/5093--

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?