sos5.0.0,
sos5.1.0
medium
This signature detects attempts to exploit a vulnerability in
the Blazix, a Java-based Web server. Blazix 1.2 and earlier
versions are vulnerable. Because Blazix does not strip bad
characters (such as '+' and '') from URL requests, attackers
may send a malicious URL to the Web server to view the jsp
server side scripts.
HTTP:EXPLOIT:BLAZIX-JSPVIEW
sos5.1.0
high
This protocol anomaly is too many authentication failures
(Web pages that require authentication) within a short period
of time between a unique pair of hosts.
HTTP:EXPLOIT:BRUTE-FORCE
"This protocol anomaly is multiple 301 (Moved Permanently),
403 (Forbidden), 404 (Not Found) and 405 (Method Not
Allowed) errors between a unique pair of hosts within a short
period of time. This could indicate that a search robot or a
script is methodically searching a Web site for vulnerable
directories or CGI scripts. The default maximum number of
301/403/404/405 errors is 16.
HTTP:EXPLOIT:BRUTE-SEARCH
sos5.0.0,
sos5.1.0
high
This signature detects attempts to access potentially
malicious Web sites. When using Microsoft Internet Explorer,
a user can be tricked into visiting a malicious Web site that
they believe is benign. Additional IE vulnerabilities may allow
the malicious Web site to run scripts in the Local Computer
zone, which bypasses security checks on the user's machine.
In your logs for the event, the malicious Web site appears as
the destination IP address.
HTTP:EXPLOIT:IE-ZONE-SPOOF
sos5.0.0,
sos5.1.0
medium
This signature detects illegal characters in a Host header
field of an HTTP/1.1 request. Attackers may send an HTTP
link, that, when selected by the user, generates an HTTP
request to a malicious Web site. In your logs, the destination
IP address for the event may be the malicious Web site;
however, some foreign Web sites may also trigger this
signature, creating a false positive. Per RFC, '_' is not a legal
character for a host name.
HTTP:EXPLOIT:ILLEGAL-HOST-CHAR
sos5.1.0
high
This signature detects malicious RealPlayer skin files.
HTTP:EXPLOIT:REALPLAYER-SKIN
sos5.1.0
medium
This signature detects attempts to exploit a known
vulnerability in the Shoutcast streaming audio server.
Attackers may gain complete control of the target host.
HTTP:EXPLOIT:SHOUTCAST-FMT-STR
sos5.1.0
high
This signature detects attempts to exploit a vulnerability in
Microsoft Windows native compressed file handler. Attackers
may send .zip files with overly long filenames to overflow
the file handler and run arbitrary code.
HTTP:EXPLOIT:WIN-MAL-COMP-FILE
sos5.1.0
medium
This signature detects GRP files sent over HTTP. GRP files
can contain Windows Program Group information, and may
be exploited by malicious users to deposit instructions or
arbitrary code on a target's system. User involvement is
required to activate GRP files; typically they are attached or
linked to a harmless-appearing e-mail message.
HTTP:EXT:GRP-EXT-HTTP
891
Copyright © 2010, Juniper Networks, Inc.
Appendix E: Log Entries
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Page 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Page 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Page 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Page 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Page 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Page 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Page 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Page 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Page 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Page 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Page 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Page 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Page 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Page 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Page 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Page 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Page 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Page 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Page 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...