⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 2007.txt

📁 snort入侵检测规则文件2.4 Snort是众所周知的网络入侵检测工具
💻 TXT
字号:
Rule:--Sid:2007--Summary:KCMS (Kodak Color Management System) is an RPC (Remote Procedure Call)service for Sun Solaris operating systems. It is able to read profilesstored on remote machines. It is possible for an attacker to bypassdirectory traversal checks and read any file on the remote system.--Impact:Possible theft of data and control of the targeted machine leading to acompromise of all resources on the machine not limited to user accountsand business data.--Detailed Information:The attacker first needs to create a directory under/etc/openwin/devdata/profiles or /usr/openwin/etc/devdata/profiles,using the ToolTalk database server is one method of creating adirectory. Once this has been achieved, the attacker is then able toperform the directory traversal.The directory traversal allows the attacker to read any file on thecompromised system. Once a sensitive system file such as the systempassword database has been retrieved, the attacker may use other toolsat his leisure to discover username and password information. This maylead to further system compromise.The KCMS daemon runs with root privileges and is typically started onboot via inetd. The ToolTalk database server is also commonly installedand started in this manner. The KCMS daemon usually listens on TCP port32871 although this can vary.--Affected Systems:	Sun Microsystems Solaris 2.5.1 (Sparc/Intel)	Sun Microsystems Solaris 2.6 (Sparc/Intel)	Sun Microsystems Solaris 7 (Sparc/Intel)	Sun Microsystems Solaris 8 (Sparc/Intel)	Sun Microsystems Solaris 9 (Sparc/Intel)--Attack Scenarios:The ToolTalk database server procedure TT_ISBUILD can be used to createa directory named TT_DB anywhere on a remote system. Creation of thisdirectory then allows the attacker to use directory traversal to furthercompromise the machine.--Ease of Attack:Once the directory has been created, further compromise is simple.--False Positives:None Known--False Negatives:None Known--Corrective Action:Disable the KCMS daemon in the file /etc/inetd.conf. Kill any runningKCMS processes and restart the inet daemon.Configure your firewall to restrict external access to the TCP and UDPport 111 used by the RPC port mapper service and the range used by RPCservices, typically 32700 to 34000.--Contributors:Sourcefire Research TeamBrian Caswell <bmc@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>--Additional References:CERT:http://www.kb.cert.org/vuls/id/850785CVE:http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0027--

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -