⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 3673.txt

📁 snort入侵检测规则文件2.4 Snort是众所周知的网络入侵检测工具
💻 TXT
字号:
Rule:--Sid:3673--Summary:This rule generates an event when an attempt is made to exploit a known vulnerability in Microsoft Systems Management Server (SMS).--Impact:Execution of arbitrary code leading to full administrator access of the machine. Denial of Service (DoS).--Detailed Information:A vulnerability exists in Microsoft SMS such that execution of arbitrary code or a Denial of Service condition can be issued against a host by sending malformed data to port 2702 of an affected server viatcp.If this attack is executed against a vulnerable host, the SMS RemoteControl agent will crash, leaving the machine unable to be administeredremotely until the service is restarted. While this service typicallyruns on SMS servers as well as clients, crashing the service on an SMSserver should leave the rest of its functionality unimpaired.While it has been postulated that this vulnerability may allow arbitrarycommand execution on the remote host, such a condition has not yet beenverified.The Microsoft SMS Remote Control system runs on port 2702, after a briefauthentication exchange on port 2701. Commands sent between the serverand the client take the form of "XXXXyyzzXXXX", where "XXXX" is a fixedcommand string, "yy" is the length of the packet beyond the second"XXXX" represented in little-endian hexadecimal, and "zz" is an unknownflag. For example, a typical command sent to the client would be"RCH0|16 00 04 00|RCHE", where "RCH0" and "RCHE" are the command string,"16 00" represents 0x16 (decimal 22), and "04 00" is the unknown flag.Precisely 22 bytes of data would follow this command, as the lengthspecifed was 22.If a packet is crafted with a length of 0 -- specifically, |00 00| --the remote agent will crash. This is presumably because the length fieldis being passed into a function such as malloc() that will behave oddlywith a zero-length size argument.The impact of this attack is to take down the Remote Control service, sothat the affected system cannot be remotely administered by a MicrosoftSMS server. Arbitrary command execution may be possible, but at thispoint that possibility has not been confirmed.Although the Remote Control service does run on SMS servers, crashingthis service does not impact the remainder of the services running onthe SMS server, and should not lead to further compromise of thatsystem.--Affected Systems:	Microsoft Systems Management Server 2.0 and prior--Attack Scenarios:An attacker merely needs to send the string "RCH0####RCHE" followed bymore than 130 characters of arbitrary data to trigger the condition.--Ease of Attack:Simple. Expoit code is available.--False Positives:None known.--False Negatives:None known.--Corrective Action:Apply the appropriate vendor supplied patches.Block access to TCP port 2702 from sources external to the protectednetwork protocols from external sources using a packet filteringfirewall.--Contributors:Sourcefire Vulnerability Research TeamAlex Kirk <akirk@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>--Additional References:--

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -