McAfee HISCDE-AB-IA Product Guide - Page 107

Windows custom signatures, Windows class Buffer Overflow

Page 107 highlights

Appendix A - Writing Custom Signatures and Exceptions Windows custom signatures Variable UAPACHE_VdocRoots UAPACHE_Vlogs UAPACHE_Vlogs_dir UIPLANET_BinDirs UIPLANET_CgiDirs UIPLANET_DocDirs UIPLANET_Process UIPLANET_Roots Description Virtual document roots Log files of virtual servers Directories for the log files of virtual servers Path to iPlanet binaries Path to CGI directories Paths to document directories Path to iPlanet ns-httpd binary Path to iPlanet root Windows custom signatures This section describes how to write custom signatures for the Windows platform. NOTE: Rules in the Windows class Files use double backslashes for paths while rules in the non-Windows class UNIX_file use a single forward slash. The class used by a signature depends on the nature of the security issue and the protection the signature can offer. Some of the classes and parameters appear in the custom signature user interface, while others do not. For those classes and parameters without a user interface, the expert method for rule creation is the only way to access them. For Windows, these classes are available: Class Buffer Overflow Files Hook Illegal API Use Illegal Use Isapi Program Registry Services SQL When to use For protection against buffer overflow For protection of file or directory operations For protection of API process hooking For protection against illegal use of the Host IPS API For protection against illegal use of the API For monitoring http requests to IIS For protection of program operations For protection of registry key and registry value operations For protection of services operations For protection of SQL operations Windows class Buffer Overflow The following table lists the possible sections and values for the Windows class Buffer Overflow: Section Class Id Values Buffer_Overflow See Common sections. Notes McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5 107

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154

Description
Variable
Virtual document roots
UAPACHE_VdocRoots
Log files of virtual servers
UAPACHE_Vlogs
Directories for the log files of virtual servers
UAPACHE_Vlogs_dir
Path to iPlanet binaries
UIPLANET_BinDirs
Path to CGI directories
UIPLANET_CgiDirs
Paths to document directories
UIPLANET_DocDirs
Path to iPlanet ns-httpd binary
UIPLANET_Process
Path to iPlanet root
UIPLANET_Roots
Windows custom signatures
This section describes how to write custom signatures for the Windows platform.
NOTE:
Rules in the Windows class Files use double backslashes for paths while rules in the
non-Windows class UNIX_file use a single forward slash.
The class used by a signature depends on the nature of the security issue and the protection
the signature can offer. Some of the classes and parameters appear in the custom signature
user interface, while others do not. For those classes and parameters without a user interface,
the expert method for rule creation is the only way to access them. For Windows, these classes
are available:
When to use
Class
For protection against buffer overflow
Buffer Overflow
For protection of file or directory operations
Files
For protection of API process hooking
Hook
For protection against illegal use of the Host IPS API
Illegal API Use
For protection against illegal use of the API
Illegal Use
For monitoring http requests to IIS
Isapi
For protection of program operations
Program
For protection of registry key and registry value operations
Registry
For protection of services operations
Services
For protection of SQL operations
SQL
Windows class Buffer Overflow
The following table lists the possible sections and values for the Windows class Buffer Overflow:
Notes
Values
Section
Buffer_Overflow
Class
See
Common sections
.
Id
Appendix A — Writing Custom Signatures and Exceptions
Windows custom signatures
107
McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5