Chinaunix首页 | 论坛 | 博客
  • 博客访问: 898669
  • 博文数量: 1812
  • 博客积分: 90800
  • 博客等级: 元帅
  • 技术积分: 22390
  • 用 户 组: 普通用户
  • 注册时间: 2008-05-03 18:35
文章分类

全部博文(1812)

文章存档

2008年(1812)

我的朋友

分类:

2008-05-03 20:08:26

技术文章
SANS公布了最新2005年互联网前20位最严重的漏洞,基于PHP的应用程序排在跨平台应用程序组里的第二
以下是英文原信息:

Introduction

The SANS Top 20 Internet Security Vulnerabilities

Four years ago, the SANS Institute and the National Infrastructure Protection Center (NIPC) at the FBI released a document summarizing the Ten Most Critical Internet Security Vulnerabilities. Thousands of organizations used that list, and the expanded Top-20 lists that followed one, two, and three years later, to prioritize their efforts so they could close the most dangerous holes first. The vulnerable services that led to worms like Blaster, Slammer, and Code Red have been on these lists.

This SANS Top-20 2005 is a marked deviation from the previous Top-20 lists. In addition to Windows and UNIX categories, we have also included Cross-Platform Applications and Networking Products. The change reflects the dynamic nature of the evolving threat landscape. Unlike the previous Top-20 lists, this list is not "cumulative" in nature. We have only listed critical vulnerabilities from the past year and a half or so. If you have not patched your systems for a length of time, it is highly recommended that you first patch the vulnerabilities listed in the Top-20 2004 list.

We have made a best effort to make this list meaningful for most organizations. Hence, the Top-20 2005 is a consensus list of vulnerabilities that require immediate remediation. It is the result of a process that brought together dozens of leading security experts. They come from the most security-conscious government agencies in the UK, US, and Singapore; the leading security software vendors and consulting firms; the top university-based security programs; many other user organizations; and the SANS Institute. A list of participants may be found at the end of this document.

The SANS Top-20 is a living document. It includes step-by-step instructions and pointers to additional information useful for correcting the security flaws. We will update the list and the instructions as more critical threats and more current or convenient methods of protection are identified, and we welcome your input along the way. This is a community consensus document -- your experience in fighting attackers and in eliminating the vulnerabilities can help others who come after you. Please send suggestions via e-mail to top20@sans.org.

Top Vulnerabilities in Windows Systems
  • W1. Windows Services
  • W2. Internet Explorer
  • W3. Windows Libraries
  • W4. Microsoft Office and Outlook Express
  • W5. Windows Configuration Weaknesses
Top Vulnerabilities in Cross-Platform Applications
  • C1. Backup Software
  • C2. Anti-virus Software
  • C3. PHP-based Applications
  • C4. Database Software
  • C5. File Sharing Applications
  • C6. DNS Software
  • C7. Media Players
  • C8. Instant Messaging Applications
  • C9. Mozilla and Firefox Browsers
  • C10. Other Cross-platform Applications
Top Vulnerabilities in UNIX Systems
  • U1. UNIX Configuration Weaknesses
  • U2. Mac OS X
Top Vulnerabilities in Networking Products
  • N1. Cisco IOS and non-IOS Products
  • N2. Juniper, CheckPoint and Symantec Products
  • N3. Cisco Devices Configuration Weaknesses
SANS公布了最新2005年互联网前20位最严重的漏洞,基于PHP的应用程序排在跨平台应用程序组里的第二
以下是英文原信息:

Introduction

The SANS Top 20 Internet Security Vulnerabilities

Four years ago, the SANS Institute and the National Infrastructure Protection Center (NIPC) at the FBI released a document summarizing the Ten Most Critical Internet Security Vulnerabilities. Thousands of organizations used that list, and the expanded Top-20 lists that followed one, two, and three years later, to prioritize their efforts so they could close the most dangerous holes first. The vulnerable services that led to worms like Blaster, Slammer, and Code Red have been on these lists.

This SANS Top-20 2005 is a marked deviation from the previous Top-20 lists. In addition to Windows and UNIX categories, we have also included Cross-Platform Applications and Networking Products. The change reflects the dynamic nature of the evolving threat landscape. Unlike the previous Top-20 lists, this list is not "cumulative" in nature. We have only listed critical vulnerabilities from the past year and a half or so. If you have not patched your systems for a length of time, it is highly recommended that you first patch the vulnerabilities listed in the Top-20 2004 list.

We have made a best effort to make this list meaningful for most organizations. Hence, the Top-20 2005 is a consensus list of vulnerabilities that require immediate remediation. It is the result of a process that brought together dozens of leading security experts. They come from the most security-conscious government agencies in the UK, US, and Singapore; the leading security software vendors and consulting firms; the top university-based security programs; many other user organizations; and the SANS Institute. A list of participants may be found at the end of this document.

The SANS Top-20 is a living document. It includes step-by-step instructions and pointers to additional information useful for correcting the security flaws. We will update the list and the instructions as more critical threats and more current or convenient methods of protection are identified, and we welcome your input along the way. This is a community consensus document -- your experience in fighting attackers and in eliminating the vulnerabilities can help others who come after you. Please send suggestions via e-mail to top20@sans.org.

Top Vulnerabilities in Windows Systems
  • W1. Windows Services
  • W2. Internet Explorer
  • W3. Windows Libraries
  • W4. Microsoft Office and Outlook Express
  • W5. Windows Configuration Weaknesses
Top Vulnerabilities in Cross-Platform Applications
  • C1. Backup Software
  • C2. Anti-virus Software
  • C3. PHP-based Applications
  • C4. Database Software
  • C5. File Sharing Applications
  • C6. DNS Software
  • C7. Media Players
  • C8. Instant Messaging Applications
  • C9. Mozilla and Firefox Browsers
  • C10. Other Cross-platform Applications
Top Vulnerabilities in UNIX Systems
  • U1. UNIX Configuration Weaknesses
  • U2. Mac OS X
Top Vulnerabilities in Networking Products
  • N1. Cisco IOS and non-IOS Products
  • N2. Juniper, CheckPoint and Symantec Products
  • N3. Cisco Devices Configuration Weaknesses
技术文章 SANS公布了2005互联网最严重漏洞TOP20,基于PHP的应用程序排第二.SANS公布了2005互联网最严重漏洞TOP20,基于PHP的应用程序排第二.SANS公布了2005互联网最严重漏洞TOP20,基于PHP的应用程序排第二.SANS公布了2005互联网最严重漏洞TOP20,基于PHP的应用程序排第二.SANS公布了2005互联网最严重漏洞TOP20,基于PHP的应用程序排第二.SANS公布了2005互联网最严重漏洞TOP20,基于PHP的应用程序排第二.SANS公布了2005互联网最严重漏洞TOP20,基于PHP的应用程序排第二.SANS公布了2005互联网最严重漏洞TOP20,基于PHP的应用程序排第二.SANS公布了2005互联网最严重漏洞TOP20,基于PHP的应用程序排第二.SANS公布了2005互联网最严重漏洞TOP20,基于PHP的应用程序排第二.SANS公布了2005互联网最严重漏洞TOP20,基于PHP的应用程序排第二.SANS公布了2005互联网最严重漏洞TOP20,基于PHP的应用程序排第二.
阅读(363) | 评论(0) | 转发(0) |
给主人留下些什么吧!~~