📄 3080.txt
字号:
Rule:--Sid:3080--Summary:This event is generated when a remote attacker sends an overly long "secure"query to a host acting as an Unreal engine server. This mayindicate an attempt to exploit a buffer overflow vulnerability.--Impact:Serious. A successful buffer overflow can permit the execution of arbitrarycode on a vulnerable system.--Detailed Information:Unreal Tournament 2003 and 2004 are popular games developed by EpicGames andavailable for Linux, Windows and Macintosh platforms. The Unreal engine isused for both client and server functionality. An overly long "secure"query can be sent to the game server, causing a buffer overflow and thesubsequent execution of arbitrary code.--Affected Systems: Multiple versions of the Unreal Engine running on Linux, Microsoft Windows and Macintosh platforms.--Attack Scenarios:An attacker can send an overly long "secure" query to a vulnerable host, causinga buffer overflow and the subsequent execution of arbitrary code.--Ease of Attack:Simple. Exploits exist.--False Positives:Unreal servers can be configured to run on arbitrary ports.Administrators should either change the port used in the rule or createa variable for the ports to be used in the rule.--False Negatives:None known.--Corrective Action:Upgrade to the most current nonaffected version of the software.--Contributors:Sourcefire Vulnerability Research TeamJudy Novak <judy.novak@sourcefire.com>--Additional References:OSVDBhttp://www.osvdb.org/displayvuln.php?osvdb_id=7217&Lookup=Lookup--
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -