📄 1243.txt
字号:
Rule:--Sid:1243--Summary:This event is generated when an attempt is made to access the .ida Indexing Service ISAPI filter. --Impact:Remote access. This attack may allow execution of arbitrary commands in System context providing complete control of the server. --Detailed Information:Microsoft Internet Information Service (IIS) installs several Internet Service Application Programming Interface (ISAPI) extensions. A buffer overflow vulnerability exists because of improper buffer checking in the .ida ISAPI filter. This may allow execution of arbitrary commands with System level access on the vulnerable server. The Code Rode worm used this vulnerability to propagate.--Affected Systems:Windows NT 4.0 IIS 4.0Windows 2000 IIS 5.0Windows XP beta IIS 6.0 beta--Attack Scenarios:An attacker can craft a special HTTP request that can cause a buffer overflow. --Ease of Attack:Simple. Send the following request to a vulnerable server:GET /a.ida?NNNN... HTTP/1.0 where 240 N's or other characters are supplied. --False Positives:None Known.--False Negatives:None Known.--Corrective Action:Consider removing the .ida ISAPI filter if it is not necessary. Download and install the appropriate patch mentioned in the Microsoft bulletin.--Contributors:Original rule written by Dr SuSE and C. Mayor. Modified by Brian Caswell <bmc@sourcefire.com>Sourcefire Research TeamJudy Novak <judy.novak@sourcefire.com>--Additional References:Arachnidshttp://www.whitehats.com/info/IDS552CERThttp://www.cert.org/incident_notes/IN-2001-08.htmlMicrosofthttp://www.microsoft.com/technet/security/bulletin/ms01-033.aspeEye Digital Securityhttp://www.eeye.com/html/Research/Advisories/AD20010618.html--
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -