snort入侵检测规则文件2.4 Snort是众所周知的网络入侵检测工具

源代码在线查看: 3526.txt

软件大小: 771 K
上传用户: lihuitao1987
关键词: snort Snort 2.4 入侵检测
下载地址: 免注册下载 普通下载 VIP

相关代码

				Rule:								--				Sid:				3526								--				Summary:				This event is generated when an attempt is made to exploit a vulnerability				associated with the Oracle XML Database (XDB) FTP UNLOCK command.								--				Impact:				A successful attack may allow arbitrary commands to be executed on a				vulnerable server by an authenticated user.								--				Detailed Information:				The Oracle XDB UNLOCK command is vulnerable to a buffer overflow				attack.  A fixed size buffer is allocated for a parameter associated				with the command.  A user-supplied parameter value that is longer than				the allocated buffer can cause a buffer overflow and allow the subsequent				execution of arbitrary commands on a vulnerable server.  It should be				noted that valid credentials must be supplied for authentication and access				to the server.								--				Affected Systems:				Oracle 9.2.0.1								--				Attack Scenarios:				An attacker can craft an UNLOCK command and supply it an overly long				parameter.								--				Ease of Attack:				Simple. Exploits exist.								--				False Positives:				None known.								--				False Negatives:				None known.								--				Corrective Action:				Upgrade to the most current non-affected version of the product.												--				Contributors:				Sourcefire Vulnerability Research Team				Judy Novak 								--				Additional References:								Variations in Exploit methods between Linux and Windows - David Litchfield:				http://www.blackhat.com/presentations/bh-usa-03/bh-us-03-litchfield-paper.pdf								--							

相关资源