?? 1149.txt
字號:
Rule: --Sid:1149--Summary:This event is generated when an attempt is made to access Wwwcount (count.cgi), a very popular CGI program used to track website usage.--Impact:Will allow access as with the privileges of the user running the process.--Detailed Information:In particular, it enumerates the number of hits on given webpages and increments them on a 'counter'. In October of 1997 two remotely exploitable problems were discovered with this program. The first problem was somewhat innocuous in that it only allowed remote users to view .GIF files they were not supposed to have access to. This may be dangerous if the site contains sensitive data in .GIF files such as demographic/financial data in charts etc.The second and most serious problem is a buffer overflow in QUERY_STRINGenviroment variable handled by the program. In essence a remote user cansend an overloy long query to the program and overflow a buffer in orderto execute their own commands as whatever privilege level the program isrunning as.--Attack Scenarios:Simple HTTP GET request.--Ease of Attack:Simple. Exploit code available--False Positives:A none vulnerable version of the application will generate events as therule only looks for access to count.cgi during a established connection.--False Negatives:--Corrective Action:If you are running version 2.3 of Wwwcount it is suggested you upgrade immediately. In the meantime you may wish to consider removing the execution bit on this program. Versions 2.4 and above of this software are available at: http://www.fccc.edu/users/muquit/Count.html --Contributors:Sourcefire Vulnerability Research TeamBrian Caswell <bmc@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>Snort documentation contributed by Neal Timm <nealtimm@sbcglobal.net>-- Additional References:--
?? 快捷鍵說明
復制代碼
Ctrl + C
搜索代碼
Ctrl + F
全屏模式
F11
切換主題
Ctrl + Shift + D
顯示快捷鍵
?
增大字號
Ctrl + =
減小字號
Ctrl + -