sos5.1.0
info
This signature detects a WinMX client performing DNS
lookups for matchmaking servers. WinMX is a peer-to-peer
file sharing client that tests firewall rules and
reverse-connectivity to determine the most effective way
to share files. WinMX queries a matchmaking server to obtain
Supernode lists, which enable the WinMX client to share
files.
P2P:WINMX:CLIENT-MATCHMAKE-DNS
sos5.1.0
info
This signature detects a WinMX client performing DNS
lookups for hosts that WinMX will probe for connectivity.
WinMX is a peer-to-peer file sharing client that tests firewall
rules and reverse-connectivity to determine the most
effective way to share files.
P2P:WINMX:CLIENT-NET-PRB-DNS
sos5.1.0
info
This signature detects an initial connection by WinMX, a
peer-to-peer file sharing client. WinMX queries a Web site
for new versions of the WinMX client software.
P2P:WINMX:CLIENT-VER-CHK
sos5.1.0
info
This signature detects attempts to obtain the IP address of
the host that tracks WinMX client versions. WinMX is a
peer-to-peer file sharing client.
P2P:WINMX:CLIENT-VER-CHK-DNS
sos5.0.0,
sos5.1.0
medium
This signature detects denial-of-service attempts against
the Mdaemon POP3 Server. Mdaemon v.6.0.7 and earlier
versions are vulnerable. Attackers may send a maliciously
crafted DELE or UIDL request to the POP3 daemon to crash
the POP3, SMTP, and IMAP services.
POP3:DOS:MDAEMON-POP-DOS
sos5.1.0
high
This protocol anomaly is a message with a multipart content
type but no boundary.
POP3:ERROR:BOUNDARY_MISSING
sos5.1.0
medium
This signature detects e-mail attachments that have the
extension .386 and were received via POP3. Because .386s
( Windows Enhanced Mode Driver) files contain executable
code, this may indicate an incoming e-mail virus. Attackers
may create malicious executables, tricking users into
executing the file and infecting the system.
POP3:EXT:DOT-386
sos5.1.0
medium
This signature detects e-mail attachments that have the
extension .ade and were received via POP3. Because .ADEs
(Microsoft Access Project Extension) files can contain
macros, this may indicate an incoming e-mail virus. Attackers
may create malicious scripts, tricking users into executing
the macros and infecting the system.
POP3:EXT:DOT-ADE
sos5.1.0
medium
This signature detects e-mail attachments that have the
extension .adp and were received via POP3. Because .ADPs
(Microsoft Access Project) files can contain macros, this
may indicate an incoming e-mail virus. Attackers may create
malicious scripts, tricking users into executing the macros
and infecting the system.
POP3:EXT:DOT-ADP
Copyright © 2010, Juniper Networks, Inc.
906
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...