alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"ET EXPLOIT Potential MS05-036 exploit - GIF with embedded ICC - Excessive Tag Count"; flow:established; content:"ICCRGBG1012"; byte_test:4,>,1024,129,relative,big; reference:url,www.microsoft.com/technet/security/Bulletin/MS05-036.mspx; reference:cve,CVE-2005-1219; classtype:misc-attack; reference:url,doc.emergingthreats.net/bin/view/Main/2002123; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/EXPLOIT/EXPLOIT_MS05-036; sid:2002123; rev:7;)

Added 2009-02-07 22:00:25 UTC

Many false positives. Suggested update: tcp $EXTERNAL_NET !$SSL_PORTS -> $HOME_NET any (msg:"ET EXPLOIT Potential MS05-036 exploit - GIF with embedded ICC - Excessive Tag Count"; flow:established; content:"ICCRGBG1012"; byte_test:4,>,1024,129,relative,big; reference:url,www.microsoft.com/technet/security/Bulletin/MS05-036.mspx; reference:cve,CVE-2005-1219; classtype:misc-attack; reference:url,doc.emergingthreats.net/bin/view/Main/2002123; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/EXPLOIT/EXPLOIT_MS05-036; sid:2002123; rev:8;)

-- VladimirAnufriev - 27 Jul 2009

What was the change you made there? Not seeing it right off. Can you send to the emerging-sigs list as well? Thanks!

-- MattJonkman - 27 Jul 2009


alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"ET EXPLOIT Potential MS05-036 exploit - GIF with embedded ICC - Excessive Tag Count"; flow:established; content:"ICCRGBG1012"; byte_test:4,>,1024,129,relative,big; reference:url,www.microsoft.com/technet/security/Bulletin/MS05-036.mspx; reference:cve,CVE-2005-1219; classtype:misc-attack; reference:url,doc.emergingthreats.net/bin/view/Main/2002123; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/EXPLOIT/EXPLOIT_MS05-036; sid:2002123; rev:7;)

Added 2009-02-07 22:00:25 UTC


alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"ET EXPLOIT Potential MS05-036 exploit - GIF with embedded ICC - Excessive Tag Count"; flow:established; content:"ICCRGBG1012"; byte_test:4,>,1024,129,relative,big; reference:url,www.microsoft.com/technet/security/Bulletin/MS05-036.mspx; reference:cve,CVE-2005-1219; classtype:misc-attack; sid:2002123; rev:6;)

Added 2008-01-25 10:56:38 UTC


alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"ET EXPLOIT Potential MS05-036 exploit - GIF with embedded ICC - Excessive Tag Count"; flow:established; content:"ICCRGBG1012"; byte_test:4,>,1024,129,relative,big; reference:url,www.microsoft.com/technet/security/Bulletin/MS05-036.mspx; reference:cve,CVE-2005-1219; classtype:misc-attack; sid:2002123; rev:6;)

Added 2008-01-25 10:56:38 UTC


alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"BLEEDING-EDGE EXPLOIT Potential MS05-036 exploit - GIF with embedded ICC - Excessive Tag Count"; flow:established; content:"ICCRGBG1012"; byte_test:4,>,1024,129,relative,big; reference:url,www.microsoft.com/technet/security/Bulletin/MS05-036.mspx; reference:cve,CVE-2005-1219; classtype:misc-attack; sid:2002123; rev:5;)



Topic revision: r3 - 2009-07-27 - MattJonkman
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats