?? 8512.txt
字號:
Rule:--Sid:8512--Summary:This event is generated when an attempt is made to exploit a known vulnerability in Microsoft systems using Microsoft SQL Server.--Impact:Serious. Denial of Service. Code execution may be possible.--Detailed Information:Microsoft SQL Server is a database platform for use on hosts using the Microsoft Windows operating system.A vulnerability in the handling of functions available through the Extended Stored Procedures API may allow an attacker to overflow a fixed length buffer and execute code of their choosing on an affected host. A DoS condition may also result due to the server failing to handle a memory copy routine properly which may cause the server to crash.In particular this rule generates an event when an attempt is made to exploit the function "xp_oamethod".--Affected Systems:Microsoft Windows SQL Server 2000--Attack Scenarios:An attacker can supply extra data in the message to the server via the function xp_oamethod to cause the overflow condition to occur. --Ease of Attack:Simple. Exploit code exists.--False Positives:None known.--False Negatives:None known.--Corrective Action:Apply the appropriate vendor supplied patches.Use MySQL, Oracle or PostGRES as alternative database engines.--Contributors:Sourcefire Vulnerability Research TeamBrian Caswell <bmc@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>--Additional References:Microsoft 10 Steps to Help Secure SQL Server 2000https://www.microsoft.com/sql/prodinfo/previousversions/securingsqlserver.mspx--
?? 快捷鍵說明
復制代碼
Ctrl + C
搜索代碼
Ctrl + F
全屏模式
F11
切換主題
Ctrl + Shift + D
顯示快捷鍵
?
增大字號
Ctrl + =
減小字號
Ctrl + -