sos5.0.0,
sos5.1.0
medium
This signature detects an attempt to download a Microsoft
Task Scheduler (.job) file. Opening a malicious .job file in
Task Scheduler may allow for arbitrary code execution,
leading to system compromise. This vulnerability is present
in Microsoft Windows 2000 Service Pack 2 and later. It is
also present in Microsoft Windows XP Service Pack 1.
HTTP:EXT:JOB
sos5.0.0,
sos5.1.0
medium
This signature detects attempts to access the Microsoft
FrontPage Extensions for UNIX .pwd file that contains
sensitive account information.
HTTP:FRONTPAGE:ADMIN.PWD-REQ
sos5.1.0
medium
This signature detects attempts to exploit a known
vulnerability in Microsoft Frontpage. Attackers may send a
malformed request with an MS-DOS device name to
shtml.exe to crash the server.
HTTP:FRONTPAGE:DOS-NAME-DOS
sos5.0.0,
sos5.1.0
medium
This signature detects attempts to exploit the '/..../' directory
traversal vulnerability in Microsoft FrontPage PWS.
HTTP:FRONTPAGE:FOURDOTS
sos5.1.0
critical
This signature detects buffer overflow attempts against
Microsoft FrontPage extensions in Windows 2000 and XP.
Attackers may execute arbitrary code on the target host.
HTTP:FRONTPAGE:FP30REG.DLL-OF
sos5.0.0,
sos5.1.0
medium
This signature detects attempts to access the Microsoft
FrontPage extensions for UNIX .pwd file which contains
sensitive account information.
HTTP:FRONTPAGE:SERVICE.PWD-REQ
sos5.0.0,
sos5.1.0
medium
This signature detects attempts to exploit a vulnerability in
the browse.asp script supplied with Hosting Controller, a
tool that allows Microsoft Windows network administrators
to centralize administrative tasks into one interface.
Attackers may send a maliciously crafted URL request for
browse.asp to view arbitrary directories and files on hard
drives.
HTTP:HOSTCTRL:BROWSE-ASP
sos5.1.0
medium
This signature detects attempts by users to download
potentially hazardous attachments from MSN Hotmail.
HTTP:HOTMAIL:EXE-DOWNLOAD
sos5.0.0,
sos5.1.0
medium
This signature detects attempts to download the site.csc
configuration file for Microsoft Ad Server. Attackers may
access sensitive information.
HTTP:IIS:AD-SERVER-CONFIG
sos5.0.0,
sos5.1.0
medium
This signature detects attempts to exploit the Showcode
ASP vulnerability in Microsoft IIS.
HTTP:IIS:ASP-CODEBROWSER-EXAIR
sos5.1.0
medium
This signature detects backslash (\) characters in the URL
portion of an HTTP request. Attackers may use a backslash
as a directory separator instead of the normal forward slash
(/) to bypass the Microsoft IIS ASP.Net authentication
capabilities and access protected resources. Note: A poorly
configured web server may also display a backslash in a
non-malicious URL request.
HTTP:IIS:ASP-DOT-NET-BACKSLASH
sos5.0.0,
sos5.1.0
high
This signature detects attempts to execute a command by
specifying a .bat or .cmd extension to a Microsoft Windows
Web server.
HTTP:IIS:BAT-&
Copyright © 2010, Juniper Networks, Inc.
892
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Страница 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Страница 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Страница 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Страница 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Страница 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Страница 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Страница 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Страница 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Страница 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Страница 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Страница 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Страница 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Страница 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Страница 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Страница 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Страница 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Страница 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Страница 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Страница 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...