sos5.1.0
info
This signature detects a WinMX client performing DNS
lookups for matchmaking servers. WinMX is a peer-to-peer
file sharing client that tests firewall rules and
reverse-connectivity to determine the most effective way
to share files. WinMX queries a matchmaking server to obtain
Supernode lists, which enable the WinMX client to share
files.
P2P:WINMX:CLIENT-MATCHMAKE-DNS
sos5.1.0
info
This signature detects a WinMX client performing DNS
lookups for hosts that WinMX will probe for connectivity.
WinMX is a peer-to-peer file sharing client that tests firewall
rules and reverse-connectivity to determine the most
effective way to share files.
P2P:WINMX:CLIENT-NET-PRB-DNS
sos5.1.0
info
This signature detects an initial connection by WinMX, a
peer-to-peer file sharing client. WinMX queries a Web site
for new versions of the WinMX client software.
P2P:WINMX:CLIENT-VER-CHK
sos5.1.0
info
This signature detects attempts to obtain the IP address of
the host that tracks WinMX client versions. WinMX is a
peer-to-peer file sharing client.
P2P:WINMX:CLIENT-VER-CHK-DNS
sos5.0.0,
sos5.1.0
medium
This signature detects denial-of-service attempts against
the Mdaemon POP3 Server. Mdaemon v.6.0.7 and earlier
versions are vulnerable. Attackers may send a maliciously
crafted DELE or UIDL request to the POP3 daemon to crash
the POP3, SMTP, and IMAP services.
POP3:DOS:MDAEMON-POP-DOS
sos5.1.0
high
This protocol anomaly is a message with a multipart content
type but no boundary.
POP3:ERROR:BOUNDARY_MISSING
sos5.1.0
medium
This signature detects e-mail attachments that have the
extension .386 and were received via POP3. Because .386s
( Windows Enhanced Mode Driver) files contain executable
code, this may indicate an incoming e-mail virus. Attackers
may create malicious executables, tricking users into
executing the file and infecting the system.
POP3:EXT:DOT-386
sos5.1.0
medium
This signature detects e-mail attachments that have the
extension .ade and were received via POP3. Because .ADEs
(Microsoft Access Project Extension) files can contain
macros, this may indicate an incoming e-mail virus. Attackers
may create malicious scripts, tricking users into executing
the macros and infecting the system.
POP3:EXT:DOT-ADE
sos5.1.0
medium
This signature detects e-mail attachments that have the
extension .adp and were received via POP3. Because .ADPs
(Microsoft Access Project) files can contain macros, this
may indicate an incoming e-mail virus. Attackers may create
malicious scripts, tricking users into executing the macros
and infecting the system.
POP3:EXT:DOT-ADP
Copyright © 2010, Juniper Networks, Inc.
916
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Страница 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Страница 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Страница 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Страница 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Страница 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Страница 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Страница 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Страница 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Страница 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Страница 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Страница 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Страница 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Страница 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Страница 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Страница 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Страница 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Страница 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Страница 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Страница 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...