📄 1272.txt
字号:
Rule: --Sid:1272--Summary:This event is generated when an attempt is made to probe a host for thesadmind RPC service.--Impact:Information gathering.--Detailed Information:Certain versions of sadmind on Solaris systems are vulnerable to aremotely exploitable buffer overflow condition. This event indicatesthat an attempt has been made to determine if the service is availableon the target host.--Affected Systems: Solaris 2.5 through 2.7 --Attack Scenarios:An attacker runs an automated tool that connects to portmapper of thetarget host, probes for RPC, and repeatedly attacks the host to bruteforce the offset in the buffer overflow.--Ease of Attack:Simple. Tools are available and exploit code exists to exploitvulnerabilites in sadmind.--False Positives:None Known--False Negatives:None Known--Corrective Action:Disable the sadmind service.Disallow access to RPC services from hosts external to the protectednetwork--Contributors:Original rule writer unknownSnort documentation contributed by David Wilburn <bug@gecko.roadtoad.net>Sourcefire Vulnerability Research TeamNigel Houghton <nigel.houghton@sourcefire.com>--Additional References:Bugtraq:http://www.securityfocus.com/bid/866/exploit/CERT:http://www.cert.org/advisories/CA-1999-16.html--
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -