'; echo 'Hillstone Networks'; } elseif ($_SERVER[HTTP_HOST] == "www.huaantech.com.cn") { echo ''; echo 'huaantech'; } elseif ($_SERVER[HTTP_HOST] == "www.dcnetworks.com.cn") { echo ''; echo 'dcnetworks'; } elseif ($_SERVER[HTTP_HOST] == "www.w-ibeda.com") { if (false===strpos($_SERVER[REQUEST_URI],"/en/")) echo ''; else echo ''; echo 'w-ibeda'; } elseif ($_SERVER[HTTP_HOST] == "www.hp-telecom.com") { echo ''; echo 'hp-telecom'; } else{ echo ''; echo 'Hillstone Networks'; } ?>
 
   
 

UDP Attack (Attack ID:800019)

Release Date:2009-09-27

Attack Name:Hacker-Tool timbuktu pro runtime detection - udp port 407

OS Type:Window

Application Type:Others

Severity:Critical

BUG ID

CVE ID

 

Description

This software not only uses available bandwidth on a network connection but also consumes system resources to the point of making the host unusable in some cases.
Spyware can be classified into multiple categories depending on the behavior of the software.
Impact:
Possible information disclosure, violation of privacy, possible violation of policy.
Affected Systems:
Windows operating system. All versions.
Additional References:
http://www.spywareguide.com/product_show.php?id=955
http://www3.ca.com/securityadvisor/pest/pest.aspx?id=453076680

 

Solution

Ensure the system is using an up to date version of the software and has had all vendor supplied patches applied.