sos5.0.0,
sos5.1.0
high
This signature detects an attempt to launch a
denial-of-service (DoS) in Allaire JRun 3.0/3.1. Attackers
may send a long string of '.' characters after the /servlet/
prefix in the URL to cause the server to interpret the URL as
a very large tree of nonexistent directories and to consume
system resources.
HTTP:PKG:ALLAIRE-JRUN-DOS
sos5.0.0,
sos5.1.0
medium
This signature detects attempts to exploit a vulnerability in
DB4Web (R) Application Server for Windows. Attackers may
use a Web browser to download arbitrary files to the target
host and obtain system information such as passwords.
HTTP:PKG:DB4WEB-FILE-ACCESS-LIN
sos5.0.0,
sos5.1.0
medium
This signature detects denial-of-service (DoS) attempts
against the eWave Servlet JSP. Attackers may remotely send
URL requests to cause the Servlet engine to terminate
abruptly.
HTTP:PKG:EWAVE-SERVLET-DOS
sos5.0.0,
sos5.1.0
high
This signature detects attempts to exploit a vulnerability in
Mountain Network Systems Webcart software. Attackers
may remotely execute arbitrary commands on the server.
HTTP:PKG:MOUNTAIN-ORDR-DSCLSR
sos5.0.0,
sos5.1.0
medium
This signature detects attempt to exploit the websendmail
script in WebGais. Attackers may execute arbitrary
commands on the Web server.
HTTP:PKG:WEBGAIS-REMOTE-EXEC
sos5.0.0,
sos5.1.0
medium
This signature detects URLs that contain multiple @
characters. Squid/2.3.STABLE5 is vulnerable. Internet
Explorer users may use these malicious URLs to evade web
proxies and gain direct access to the internet.
HTTP:PROXY:DOUBLE-AT-AT
sos5.0.0,
sos5.1.0
medium
This signature detects attempts to exploit an input validation
vulnerability in HTTP. Attackers may use encoded CR/LF
(carriage return/line feed) characters in an HTTP response
header to split HTTP responses into multiple parts, enabling
them to misrepresent web content to the recipient.
HTTP:REQERR:HEADER-INJECT
sos5.0.0,
sos5.1.0
medium
This protocol anomaly is an invalid HTTP request format,
such as a request that begins before a previous one ends.
HTTP:REQERR:REQ-INVALID-FORMAT
sos5.0.0,
sos5.1.0
medium
This protocol anomaly is an HTTP request with an
exceedingly long UTF8 codes. This may be an attempt to
overflow a portion of the Web server, or that a script is being
made available to the Web server.
HTTP:REQERR:REQ-LONG-UTF8CODE
sos5.0.0,
sos5.1.0
medium
This protocol anomaly is a malformed URL, such as a
Unicode encoded field with non-hex digits or an encoded
NULL byte.
HTTP:REQERR:REQ-MALFORMED-URL
sos5.1.0
medium
This signature detects denial-of-service (DoS) attempts
against the Savant HTTP server. Savant HTTP server 3.0
and earlier versions are vulnerable. Attackers may send a
maliciously crafted HTTP GET request to the Web server to
crash the server and create a DoS.
HTTP:SAVANT:GET-DOT1
sos5.1.0
info
This signature detects the use of Download Accelerator, a
spyware application.
HTTP:SPYWARE:DOWNLOAD-ACCEL
Copyright © 2010, Juniper Networks, Inc.
894
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...