sos5.0.0,
sos5.1.0
high
This signature detects an attempt to launch a
denial-of-service (DoS) in Allaire JRun 3.0/3.1. Attackers
may send a long string of '.' characters after the /servlet/
prefix in the URL to cause the server to interpret the URL as
a very large tree of nonexistent directories and to consume
system resources.
HTTP:PKG:ALLAIRE-JRUN-DOS
sos5.0.0,
sos5.1.0
medium
This signature detects attempts to exploit a vulnerability in
DB4Web (R) Application Server for Windows. Attackers may
use a Web browser to download arbitrary files to the target
host and obtain system information such as passwords.
HTTP:PKG:DB4WEB-FILE-ACCESS-LIN
sos5.0.0,
sos5.1.0
medium
This signature detects denial-of-service (DoS) attempts
against the eWave Servlet JSP. Attackers may remotely send
URL requests to cause the Servlet engine to terminate
abruptly.
HTTP:PKG:EWAVE-SERVLET-DOS
sos5.0.0,
sos5.1.0
high
This signature detects attempts to exploit a vulnerability in
Mountain Network Systems Webcart software. Attackers
may remotely execute arbitrary commands on the server.
HTTP:PKG:MOUNTAIN-ORDR-DSCLSR
sos5.0.0,
sos5.1.0
medium
This signature detects attempt to exploit the websendmail
script in WebGais. Attackers may execute arbitrary
commands on the Web server.
HTTP:PKG:WEBGAIS-REMOTE-EXEC
sos5.0.0,
sos5.1.0
medium
This signature detects URLs that contain multiple @
characters. Squid/2.3.STABLE5 is vulnerable. Internet
Explorer users may use these malicious URLs to evade web
proxies and gain direct access to the internet.
HTTP:PROXY:DOUBLE-AT-AT
sos5.0.0,
sos5.1.0
medium
This signature detects attempts to exploit an input validation
vulnerability in HTTP. Attackers may use encoded CR/LF
(carriage return/line feed) characters in an HTTP response
header to split HTTP responses into multiple parts, enabling
them to misrepresent web content to the recipient.
HTTP:REQERR:HEADER-INJECT
sos5.0.0,
sos5.1.0
medium
This protocol anomaly is an invalid HTTP request format,
such as a request that begins before a previous one ends.
HTTP:REQERR:REQ-INVALID-FORMAT
sos5.0.0,
sos5.1.0
medium
This protocol anomaly is an HTTP request with an
exceedingly long UTF8 codes. This may be an attempt to
overflow a portion of the Web server, or that a script is being
made available to the Web server.
HTTP:REQERR:REQ-LONG-UTF8CODE
sos5.0.0,
sos5.1.0
medium
This protocol anomaly is a malformed URL, such as a
Unicode encoded field with non-hex digits or an encoded
NULL byte.
HTTP:REQERR:REQ-MALFORMED-URL
sos5.1.0
medium
This signature detects denial-of-service (DoS) attempts
against the Savant HTTP server. Savant HTTP server 3.0
and earlier versions are vulnerable. Attackers may send a
maliciously crafted HTTP GET request to the Web server to
crash the server and create a DoS.
HTTP:SAVANT:GET-DOT1
sos5.1.0
info
This signature detects the use of Download Accelerator, a
spyware application.
HTTP:SPYWARE:DOWNLOAD-ACCEL
Copyright © 2010, Juniper Networks, Inc.
904
Network and Security Manager Administration Guide
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Page 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Page 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Page 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Page 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Page 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Page 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Page 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Page 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Page 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Page 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Page 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Page 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Page 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Page 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Page 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Page 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Page 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Page 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Page 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...