281.txt

来自「snort入侵检测规则文件2.4 Snort是众所周知的网络入侵检测工具」· 文本 代码 · 共 74 行

TXT
74
字号
Rule:  --Sid:281--Summary:This event is generated when an attempt is made to issue a Denial of Service (DoS) attack that causes some Ascend routers to reboot.--Impact:Denial of Service. Traffic between network segments or between internal and external networks can be disrupted.--Detailed Information:Some Ascend routers run configuration software that is able to locate other Ascend routers by broadcasting on UDP port 9 (discard).  This portis listened on by the Java Configurator tool.  A packet with a speciallycrafted payload can cause the routers to reboot.--Affected Systems:	Lucent Ascend MAX Router 5.0 and previous	Lucent Ascend Pipeline Router 6.0 and previous	Lucent Ascend Pipeline Router 6.0 and previous--Attack Scenarios:Ascend routers can be forced to reboot remotely without authorization.  Since the offending packet is UDP (which is not connection oriented), the sending address can be easily spoofed.  --Ease of Attack:Simple.  An exploit is available.--False Positives:None known.--False Negatives:None known.--Corrective Action:An upgrade is available from the manufacturer.  Filtering traffic to port 9 will also prevent this exploit.  --Contributors:Original Rule Writer UnknownSourcefire Research TeamNigel Houghton <nigel.houghton@sourcefire.com>Snort documentation contributed by Steven Alexander<alexander.s@mccd.edu>-- Additional References:Arachnids:http://www.whitehats.com/info/IDS262CVE:http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0060Bugtraq:http://www.securityfocus.com/bid/714--

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?