sos5.1.0
medium
This signature detects attempts to evade antivirus tools
such as MIME Tools, a Linux-based e-mail MIME scanner.
The MIME RFC allows for an empty boundary, but most all
mail clients use one, while many viruses will not.
SMTP:EXPLOIT:MIME-TOOLS-EVADE
sos5.1.0
medium
This signature detects e-mail attachments that have the
extension .386 and were sent via SMTP. Because .386s (
Windows Enhanced Mode Driver) files can contain
executable code, this may indicate an incoming e-mail virus.
Attackers may create malicious executables, tricking users
into executing the file and infecting the system.
SMTP:EXT:DOT-386
sos5.1.0
medium
This signature detects e-mail attachments that have the
extension .ade and were sent via SMTP. Because .ADEs (
Microsoft Access Project Extension) files can contain macros,
this may indicate an incoming e-mail virus. Attackers may
create malicious scripts, tricking users into executing the
macros and infecting the system.
SMTP:EXT:DOT-ADE
sos5.1.0
medium
This signature detects e-mail attachments that have the
extension .adp and were sent via SMTP. Because .ADPs
(Microsoft Access Project) files can contain macros, this
may indicate an incoming e-mail virus. Attackers may create
malicious scripts, tricking users into executing the macros
and infecting the system.
SMTP:EXT:DOT-ADP
sos5.1.0
medium
This signature detects e-mail attachments that have the
extension .bas and were sent via SMTP. Because .BASs
(Microsoft Visual Basic Class Module) files contain
executable code, this may indicate an incoming e-mail virus.
Attackers may create malicious executables, tricking users
into executing the file and infecting the system.
SMTP:EXT:DOT-BAS
sos5.1.0
medium
This signature detects e-mail attachments with the
extension '.bat' sent via SMTP. This may indicate an incoming
e-mail virus. .BATs (executable files) contain one or more
scripts. Attackers may create malicious executables, tricking
the user into executing the file and infecting the system.
SMTP:EXT:DOT-BAT
sos5.1.0
medium
This signature detects e-mail attachments that have the
extension .chm and were sent via SMTP. Because .CHMs
(Compiled HTML Help File) files can contain scripts, this
may indicate an incoming e-mail virus. Attackers may create
malicious scripts, tricking users into executing the files and
infecting the system.
SMTP:EXT:DOT-CHM
sos5.1.0
medium
This signature detects e-mail attachments with the
extension '.cmd' sent via SMTP. This may indicate an
incoming e-mail virus. CMD files contain commands that
when executed can cause significant damage to a windows
system.
SMTP:EXT:DOT-CMD
919
Copyright © 2010, Juniper Networks, Inc.
Appendix E: Log Entries
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...