📄 3086.txt
字号:
Rule: --Sid: 3086-- Summary: This event is generated when an attempt is made to access the filespp_sta.stm on a 3com wireless router.-- Impact: Intelligence gathering activity.--Detailed Information:The 3Com ADSL wireless router 3CRADSL72 is prone to an authenticationbypass issue that may allow a malicious third party to gain informationon the device and the networks it serves. It may also be possible for anattacker to gain administrative privileges on the device.--Affected Systems: 3Com 3CRADSL72 ADSL wireless router--Attack Scenarios: An attacker with access to the page can gain information on the networksbeing served by the router and use the knowledge gained in furtherattacks on the system. The attacker may also be able to gainadministrative access to the router.-- Ease of Attack: Simple. No exploit software is required.-- False Positives:None Known.--False Negatives:The address of the router should be added to the $HTTP_SERVERS variableif the rule is used in the default form. Otherwise a $WIRELESS_ROUTERSvariable could be used in both the snort.conf and the rule to eliminateany possible false positives.-- Corrective Action: Apply the appropriate vendor supplied patch.--Contributors: Sourcefire Research TeamMatt Watchinski <mwatchinski@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>-- Additional References:--
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -