?? 2080.txt
字號:
Rule:--Sid:2080--Summary:number for the rpc service lockd.--Impact:Intelligence gathering--Detailed Information:This may be an attacker probing for vulnerable versions of rpc services.In this case, the rpc service lockd.If a user connects to port 1024 being used by the rpc service lockd, a denial of service can be issued by supplying random input to the service.--Affected Systems: Debian Linux 2.1, 2.2 pre potato and 2.2 MandrakeSoft Linux Mandrake 6.0, 6.1 and 7.0 RedHat Linux 6.0 sparc, i386 and alpha RedHat Linux 6.1 sparc, i386 and alpha RedHat Linux 6.2 sparc, i386 and alpha--Attack Scenarios:The attacker needs to send random data to port 1024 used by nlockmgr.--Ease of Attack:Simple--False Positives:None Known--False Negatives:None Known--Corrective Action:Apply the appropriate patches for the system.Upgrade the software to the latest non vulnerable version.--Contributors:Sourcefire Research TeamBrian Caswell <bmc@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>--Additional References:Bugtraq:http://www.securityfocus.com/bid/1372CVE:http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0508--
?? 快捷鍵說明
復制代碼
Ctrl + C
搜索代碼
Ctrl + F
全屏模式
F11
切換主題
Ctrl + Shift + D
顯示快捷鍵
?
增大字號
Ctrl + =
減小字號
Ctrl + -