sos5.0.0,
sos5.1.0
critical
This signature detects buffer overflow attempts against the
realpath() function in Wu-ftpd, a software package that
provides File Transfer Protocol (FTP) services for UNIX and
Linux systems. Wu-ftpd version 2.5.0 and earlier are
vulnerable. Attackers may send a maliciously crafted FTP
pathname to overflow a buffer in realpath() and execute
arbitrary commands with administrator privileges.
FTP:WU-FTP:REALPATH-OF2
sos5.0.0,
sos5.1.0
high
This signature detects attempts to access a 3COM wireless
router web page that contains sensitive administrative
information. No authentication is required to access this
page.
HTTP:3COM:3COM-PASS-LEAK
sos5.0.0,
sos5.1.0
info
This signature detects direct requests to the logout web
service on a 3Com 3crwe754g72-a based device. Attackers
that are spoofing a 3Com administrator's IP address may
call the logout application to force the administrator to
logout.
HTTP:3COM:ADMIN-LOGOUT
sos5.0.0,
sos5.1.0
high
This signature detects attempts to download the
configuration file from a 3Com 3crwe754g72-a based device.
Attackers may use the sensitive information obtained from
the configuration file to gain full control over the device.
HTTP:3COM:CONF-DOWNLOAD
sos5.1.0
medium
This signature detects attempts to cause a 3Com
3crwe754g72-a based device to clear its logs. Attackers may
use spoofed IP address to send a log clear request without
authenticating.
HTTP:3COM:LOG-CLEAN
sos5.0.0,
sos5.1.0
high
This signature detects attempts to exploit a vulnerability in
Apache Web server. All Apache servers on all platforms
running version Apache 2.0.50 and earlier are vulnerable.
Using apr-util, attackers may include a crafted IPv6 literal
address within an HTTP request to an Apache v2 server to
cause the Apache child process to quit. On BSD systems,
attackers may also be able to execute arbitrary code.
HTTP:APACHE:APACHE-BADIPV6
sos5.0.0,
sos5.1.0
high
This signature detects attempts to exploit a vulnerability in
Apache Web server. All Apache servers on all platforms
running version Apache 2.0.50 and earlier are vulnerable.
Using apr-util, attackers may include a crafted IPv6 literal
address within an HTTP request to an Apache v2 server to
cause the Apache child process to quit. On BSD systems,
attackers may also be able to execute arbitrary code.
HTTP:APACHE:APACHE-BADIPV6-2
sos5.1.0
critical
This signature detects attempts to infect Apache Web
servers with the Apache Worm. Apache versions 1.3.26,
2.0.38 and prior are vulnerable. Apache improperly calculates
required buffer sizes for chunked encoded requests due to
a signed interpretation of an unsigned integer value. The
worm sends POST requests containing malicious chunked
encoded data to exploit the Apache daemon.
HTTP:APACHE:CHUNKED-WORM
875
Copyright © 2010, Juniper Networks, Inc.
Appendix E: Log Entries
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...