?? 2907.txt
字號:
Rule: --Sid: 2907-- Summary: This event is generated when an attempt is made to exploit a knownvulnerability in an Oracle database server.-- Impact: Serious. Possible execution of arbitrary code and Denial of Service.--Detailed Information:This event is generated when an attempt is made to exploit a knownvulnerability in an Oracle database implementation. Multiple bufferoverflow conditions are present in numerous packages and procedures.Exploitation of these vulnerable procedures may allow an attacker toexecute code of their choosing as the user running the database. In thecase of databases running on Microsoft Windows platforms, this is theLocal System account which may mean a compromise of the operating systemas well as the database.This event indicates that an attempt has been made to exploit avulnerability in the procedure drop_snapshot_repobject. This procedure is included insys.dbms_repcat_sna.--Affected Systems: Oracle Oracle9i--Attack Scenarios: If an attacker can supply enough data to the procedure in question, itmay be possible to cause the overflow condition to occur and present theattacker with the opportunity to execute code of their choosing.-- Ease of Attack: Simple.-- False Positives:None Known--False Negatives:None Known-- Corrective Action: Apply the appropriate vendor supplied patch--Contributors: Sourcefire Research TeamBrian Caswell <bmc@sourcefire.com>Alex Kirk <alex.kirk@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>-- Additional References:--
?? 快捷鍵說明
復制代碼
Ctrl + C
搜索代碼
Ctrl + F
全屏模式
F11
切換主題
Ctrl + Shift + D
顯示快捷鍵
?
增大字號
Ctrl + =
減小字號
Ctrl + -