⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 1964.txt

📁 snort入侵检测规则文件2.4 Snort是众所周知的网络入侵检测工具
💻 TXT
字号:
Rule:--Sid:1964--Summary:This event is generated when an attempt is made to exploit a bufferoverflow associated with the Remote Procedure Call (RPC) ToolTalk.--Impact:Remote root access. This attack may permit the execution of arbitrarycommands with the privileges of root.--Detailed Information:The ttdbserverd RPC service, more commonly known as the ToolTalkdatabase server, allows applications to communicate in the CommonDesktop Environment (CDE).  The ToolTalk service receives ToolTalkmessages created and sent by applications and delivers them to theappropriate recipient applications.  The ToolTalk database server isenabled by default on hosts with CDE.  A function in the code receivesan argument for a pathname.  If an overly long pathname is passed to thefunction, a buffer overflow may occur, possibly allowing the executionof arbitrary commands with the privileges of root.--Affected Systems:	HP HP-UX 10.10, 10.20, 10.30, 11.0	IBM AIX 4.1, 4.1.1, 4.1.2, 4.1.3, 4.1.4, 4.1.5, 4.2, 4.2.1, 4.3	SGI IRIX 5.2, 5.3, 6.0, 6.0.1, 6.2, 6.3, 6.4	Sun Solaris 1.1, 1.1.1, 1.1.2, 1.1.3, 1.1.4, 1.2, 2.0, 2.1, 2.2, 2.3,	2.4, 2.5, 2.5.1, 2.6--Attack Scenarios:An attacker can query the portmapper to discover the port wherettdbserverd runs.  Alternately, an attacker may attempt to execute theexploit code on any listening port in the RPC range if the portmapper isblocked.--Ease of Attack:Simple.  Exploit scripts are freely available.--False Positives:None Known.--False Negatives:None Known.--Corrective Action:Limit remote access to RPC services.Filter RPC ports at the firewall to ensure access is denied toRPC-enabled machines.Disable unneeded RPC services.--Contributors:Sourcefire Vulnerability Research TeamBrian Caswell <bmc@sourcefire.com>Judy Novak <judy.novak@sourcefire.com>--Additional References:--

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -