sos5.0.0,
sos5.1.0
medium
This signature detects attempts to exploit a vulnerability in
the Blazix, a Java-based Web server. Blazix 1.2 and earlier
versions are vulnerable. Because Blazix does not strip bad
characters (such as '+' and '') from URL requests, attackers
may send a malicious URL to the Web server to view the jsp
server side scripts.
HTTP:EXPLOIT:BLAZIX-JSPVIEW
sos5.1.0
high
This protocol anomaly is too many authentication failures
(Web pages that require authentication) within a short period
of time between a unique pair of hosts.
HTTP:EXPLOIT:BRUTE-FORCE
"This protocol anomaly is multiple 301 (Moved Permanently),
403 (Forbidden), 404 (Not Found) and 405 (Method Not
Allowed) errors between a unique pair of hosts within a short
period of time. This could indicate that a search robot or a
script is methodically searching a Web site for vulnerable
directories or CGI scripts. The default maximum number of
301/403/404/405 errors is 16.
HTTP:EXPLOIT:BRUTE-SEARCH
sos5.0.0,
sos5.1.0
high
This signature detects attempts to access potentially
malicious Web sites. When using Microsoft Internet Explorer,
a user can be tricked into visiting a malicious Web site that
they believe is benign. Additional IE vulnerabilities may allow
the malicious Web site to run scripts in the Local Computer
zone, which bypasses security checks on the user's machine.
In your logs for the event, the malicious Web site appears as
the destination IP address.
HTTP:EXPLOIT:IE-ZONE-SPOOF
sos5.0.0,
sos5.1.0
medium
This signature detects illegal characters in a Host header
field of an HTTP/1.1 request. Attackers may send an HTTP
link, that, when selected by the user, generates an HTTP
request to a malicious Web site. In your logs, the destination
IP address for the event may be the malicious Web site;
however, some foreign Web sites may also trigger this
signature, creating a false positive. Per RFC, '_' is not a legal
character for a host name.
HTTP:EXPLOIT:ILLEGAL-HOST-CHAR
sos5.1.0
high
This signature detects malicious RealPlayer skin files.
HTTP:EXPLOIT:REALPLAYER-SKIN
sos5.1.0
medium
This signature detects attempts to exploit a known
vulnerability in the Shoutcast streaming audio server.
Attackers may gain complete control of the target host.
HTTP:EXPLOIT:SHOUTCAST-FMT-STR
sos5.1.0
high
This signature detects attempts to exploit a vulnerability in
Microsoft Windows native compressed file handler. Attackers
may send .zip files with overly long filenames to overflow
the file handler and run arbitrary code.
HTTP:EXPLOIT:WIN-MAL-COMP-FILE
sos5.1.0
medium
This signature detects GRP files sent over HTTP. GRP files
can contain Windows Program Group information, and may
be exploited by malicious users to deposit instructions or
arbitrary code on a target's system. User involvement is
required to activate GRP files; typically they are attached or
linked to a harmless-appearing e-mail message.
HTTP:EXT:GRP-EXT-HTTP
881
Copyright © 2010, Juniper Networks, Inc.
Appendix E: Log Entries
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.3
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Page 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Page 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Page 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Page 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Page 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Page 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Page 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Page 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Page 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Page 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Page 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Page 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Page 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Page 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Page 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Page 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Page 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...