This is the snapshot of Snot Latest Rules

源代码在线查看: 661.txt

软件大小: 17049 K
上传用户: nassdaq
关键词: snapshot Latest Rules This
下载地址: 免注册下载 普通下载 VIP

相关代码

				Rule:								--				Sid:				661								--				Summary:				This event is generated when an attempt is made to exploit a problem with Majordomo software that allows arbitrary commands to be executed on the server.								--				Impact:				Attempted administrator access.  This is an attempt to execute a command on a server where Majordomo is installed. 								--				Detailed Information:				Majordomo is an application that automates mailing list management.  An input validation error allows attackers to use a malformed email header as a command that will be executed on the host.  To be vulnerable, the server must use a list or a hidden list and the configuration file must specify an advertise or noadvertise option.  This has been documented as either a local or remote attack on the host. 								--				Affected Systems:				Majordomo versions up to and including 1.94.4.								--				Attack Scenarios:				An attacker can send a malformed e-mail header to the Majordomo host.  The host executes a command that facilitates access to the host.												--				Ease of Attack:				Simple. Use an appropriate malformed header and supply a command that enables access to the host. 								--				False Positives:				None Known.								--				False Negatives:				None Known.								--				Corrective Action:				Upgrade to Majordomo version 1.94.5 or higher.				--				Contributors:				Original rule written by Max Vision 				Sourcefire Vulnerability Research Team				Judy Novak 								--				Additional References:								CVE:				http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0207								--							

相关资源