?? 2557.txt
字號:
Rule: --Sid: 2557-- Summary: This event is generated when an attempt is made to exploit a knownvulnerability in Oracle Application Server Web Cache.-- Impact: Serious. Possible execution of arbitrary code leading to remoteadministrative access.--Detailed Information:The Oracle Application Server Web Cache is vulnerable to a bufferoverrun caused by poor checking of the length of an HTTP Header. If alarge invalid HTTP Request Method is supplied to a vulnerable system, anattacker may be presented with the opportunity to overrun a fixed lengthbuffer and subsequently execute code of their choosing on the server.--Affected Systems:Oracle Application Server Web Cache 10g 9.0.4 .0Oracle Oracle9i Application Server Web Cache 2.0 .0.4Oracle Oracle9i Application Server Web Cache 9.0.2 .3Oracle Oracle9i Application Server Web Cache 9.0.2 .2Oracle Oracle9i Application Server Web Cache 9.0.3 .1--Attack Scenarios: An attacker might supply an HTTP Request Method of more than 432 bytes,causing the overflow to occur.-- Ease of Attack: Simple.-- False Positives:None Known--False Negatives:This rule examines Oracle Web Cache server on port 7777 or 7778. It is possibleto configure the Oracle Web Cache server to run on different ports. The ruleshould be configured to reflect the appropriate ports of Oracle Web Cacheservers on your network.-- Corrective Action: Apply the appropriate vendor supplied patch--Contributors: Sourcefire Vulnerability Research TeamJudy Novak <judy.novak@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>-- Additional References:--
?? 快捷鍵說明
復(fù)制代碼
Ctrl + C
搜索代碼
Ctrl + F
全屏模式
F11
切換主題
Ctrl + Shift + D
顯示快捷鍵
?
增大字號
Ctrl + =
減小字號
Ctrl + -