sos5.0.0,
sos5.1.0
medium
This signature detects directory traversal attempts that
exploit the print.cgi script in TECH-NOTE 2000. Because the
script validates input incorrectly, attackers may remotely
access arbitrary files from the server.
HTTP:CGI:TECHNOTE-PRINT-DSCLSR
sos5.0.0,
sos5.1.0
medium
This signature detects attempts to exploit a vulnerability in
W3-msql, a CGI program that acts as a Web interface for
Mini SQL (mSQL). W3-msql version 2.0.11 is vulnerable.
Attackers may remotely send a maliciously crafted scanf
call to overflow the content-length field and execute
arbitrary code with Web server privileges.
HTTP:CGI:W3-MSQL-CGI-OF
sos5.1.0
medium
This signature detects buffer overflow attempts that exploit
the w3-msql CGI script in mini-SQL. Attackers may execute
arbitrary commands on the server.
HTTP:CGI:W3-MSQL-FILE-DISCLSR
sos5.0.0,
sos5.1.0
critical
This signature detects attempts to exploit a vulnerability in
the WebPALS CGI script. Attackers may remotely execute
arbitrary code with root permissions.
HTTP:CGI:WEBPALS-EXEC
sos5.0.0,
sos5.1.0
critical
This signature detects attempts to gain administrative
access to the WebSpeed server without normal
authentication.
HTTP:CGI:WEBSPEED-WSMADMIN
sos5.0.0,
sos5.1.0
medium
This signature detects attempts to exploit a vulnerability in
the SilverPlatter WebSPIRS webspirs.cgi file. Attackers may
access arbitrary system files
HTTP:CGI:WEBSPIRS-FILE-DISCLSR
sos5.0.0,
sos5.1.0
medium
This signature detects attempts to exploit a vulnerability in
the YaBB.pl CGI script. Attackers may view arbitrary files.
HTTP:CGI:YABB-DIR-TRAVERSAL
sos5.1.0
critical
This signature detects attempts to exploit a vulnerability in
some Web servers and Web proxies. Attackers may send
user authentication that includes format strings to crash
some Web servers, creating a denial-of-service (DoS) or
enabling the attackers to take control of the firewall as root.
HTTP:CHKP:AUTH-FMT-STR
sos5.1.0,
sos5.0.0
critical
This signature detects attempts to exploit a vulnerability in
the CheckPoint AI/Smart Defense HTTP proxy engine.
Attackers may send a scheme that includes format strings
to crash the proxy engine, creating a denial-of-service (DoS)
or enabling the attackers to take control of the firewall as
root.
HTTP:CHKP:FW1-FORMAT-STR
sos5.0.0,
sos5.1.0
medium
This signature detects attempts to exploit the web proxy
functions of CheckPoint FireWall-1. When the HTTP
CONNECT method, used to build generic Transit Layer
Security over HTTP, is used by default, the firewall web
proxies may be used as open TCP proxies. Attackers may
use an HTTP proxy to connect to a server, then use the
CONNECT method to access other servers and launch further
attacks.
HTTP:CHKP:FW1-PROXY
sos5.0.0,
sos5.1.0
critical
This signature detects attempts to exploit a vulnerability in
Cisco IOS. Attackers may remotely gain full administrative
access to the router.
HTTP:CISCO:IOS-ADMIN-ACCESS
879
Copyright © 2010, Juniper Networks, Inc.
Appendix E: Log Entries
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...