snort入侵检测规则文件2.4 Snort是众所周知的网络入侵检测工具

源代码在线查看: 350.txt

软件大小: 771 K
上传用户: lihuitao1987
关键词: snort Snort 2.4 入侵检测
下载地址: 免注册下载 普通下载 VIP

相关代码

				SID:				350				--								Rule:				--								Summary:				This event is generated when an attack attempt is made against an ftp 				server possibly running a vulnerable ftpd				--								Impact:				Possible execution of commands on the affected server as with elevated user privileges				--								Detailed Information:				The Washington University ftp daemon (wu-ftpd) has a problem with very 				log directory names. There is insufficent checking on directories 				created by users allowing possible insertion of data into the stack.This				can lead to execution of code with root / elevated user privileges.				--								Affected Systems:				NcFTP Software NcFTPD 2.3.5				Washington University wu-ftpd 2.4.2 (beta 18) VR10 				RedHat wu-ftpd 2.4.2 b18-2 				Washington University wu-ftpd 2.4.2 academ[BETA-18] 				Probably others as well, susspect anything under Washington University wu-ftpd 2.6.0 for this particular exploit.				--								Attack Scenarios:				A local attacker will attempt to create long named directories on the 				ftp server wich are not checked correctly in the server code. This can 				allow commands to be executed with elevated user privileges				--								Ease of Attack:				simple, Exploit code exists				--								False Positives:				None known				--								False Negatives:				None known				--								Corrective Action:				Upgrade to newest version of wuftpd, or replace with something more secure.				--								Contributors:				Snort documentation contributed by matthew harvey 				Original Rule Writer Unknown				Sourcefire Research Team				Nigel Houghton 								--				References:								--							

相关资源