?? 1921.txt
字號:
Rule:--Sid:1921--Summary:This event is generated when an attempt is made to exploit avulnerability associated with the GlFtpd ZIPCHK command that may permitthe execution of arbitrary commands with the privileges of the processrunning GlFtpd.--Impact:Remote access. A successful attack may permit the execution ofarbitrary commands with the privileges of GlFtpd on the vulnerableserver.--Detailed Information:This event is generated when an attempt is made to exploit avulnerability associated with the ZIPCHK command of the GlFtpd server. GlFtpd provides FTP software for UNIX hosts. The ZIPCHK commandsupplies integrity checking of a downloaded ZIP file. The file namesupplied with the ZIPCHK is not scrutinized to determine if it is avalid name. An attacker can supply a UNIX command with the character";" in the argument to the ZIPCHK command, causing the execution of thecommand with the privileges of the process running GlFtpd.--Affected Systems: GlFtpd 1.17.2. --Attack Scenarios:An attacker can remotely execute arbitrary commands on the vulnerableserver.--Ease of Attack:Simple. Exploits code exists.--False Positives:None Known.--False Negatives:None Known.--Corrective Action:Upgrade to the latest non-affected version of the software.--Contributors:Sourcefire Vulnerability Research TeamBrian Caswell <bmc@sourcefire.com> Nigel Houghton <nigel.houghton@sourcefire.com>Judy Novak <judy.novak@sourcefire.com>--Additional References:--
?? 快捷鍵說明
復(fù)制代碼
Ctrl + C
搜索代碼
Ctrl + F
全屏模式
F11
切換主題
Ctrl + Shift + D
顯示快捷鍵
?
增大字號
Ctrl + =
減小字號
Ctrl + -