Table 124: Deep Inspection Alarm Log Entries
(continued)
Versions
Severity
Attack Description
Attack Name
sos5.0.0,
sos5.1.0
medium
This signature detects buffer overflow attempts against WS
FTP Server. The code that handles arguments to the SITE
CPWD command, which allows users to change their
password, contains an unchecked string copy. Attackers
may send a maliciously crafted argument in the SITE CPWD
command to overflow the buffer and overwrite the return
address.
FTP:WS-FTP:CPWD
sos5.0.0,
sos5.1.0
high
This signature detects buffer overflow attempts against the
DELE command in a WU-ftpd server. Wu-ftpd versions 2.4
and prior (Academ beta12-18 included) are vulnerable. This
may be a variation on the ADM exploit; attackers may log in
anonymously using a hardcoded e-mail address as the
password.
FTP:WU-FTP:DELE-OF
sos5.0.0,
sos5.1.0
high
This signature detects attempts to exploit an input validation
vulnerability in wuFTPd running on FreeBSD. FreeBSD
versions 4.3 and 4.4 are vulnerable. Because user input goes
directly into a format string for a *printf function, attackers
may overwrite data on a stack (i.e. a return address), access
the shellcode pointed to by the overwritten eip, and execute
arbitrary commands.
FTP:WU-FTP:FTPD-BSD-X86
sos5.0.0,
sos5.1.0
high
This signature detects attempts to exploit a vulnerability in
Wu-ftpd, a software package that provides File Transfer
Protocol (FTP) services for UNIX and Linux systems. Wu-ftpd
versions 2.6.1 to 2.6.18 are vulnerable. Attackers may send
a maliciously crafted pathname in a CWD or LIST command
to the FTP server to execute arbitrary commands as root.
FTP:WU-FTP:GLOBARG
sos5.0.0,
sos5.1.0
critical
This signature detects attempts to exploit a format string
vulnerability in Wu-ftpd 2.4 running on Solaris 2.8. Attackers
may inject malicious code into the Wu-ftp daemon memory
space; later in the same session, the attacker may exploit a
format string vulnerability in the Ireply() function to access
that code and execute arbitrary commands as root.
FTP:WU-FTP:IREPLY-FS
sos5.0.0,
sos5.1.0
high
This signature detects attempts to exploit an input validation
vulnerability in wuFTPd running on LINUX. All versions are
susceptible. Because user input goes directly into a format
string for a *printf function, attackers may overwrite data
on a stack, i.e. a return address, access the shellcode pointed
to by the overwritten eip, and execute arbitrary commands.
This same attack may be successful seen against ProFTPD
servers.
FTP:WU-FTP:LINUX-OF
sos5.0.0,
sos5.1.0
critical
This signature detects buffer overflow attempts against the
realpath() function in Wu-ftpd, a software package that
provides File Transfer Protocol (FTP) services for UNIX and
Linux systems. Wu-ftpd version 2.5.0 and earlier are
vulnerable. Attackers may send a maliciously crafted FTP
pathname to overflow a buffer in realpath() and execute
arbitrary commands with administrator privileges.
FTP:WU-FTP:REALPATH-OF
Copyright © 2010, Juniper Networks, Inc.
874
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...