alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"ET EXPLOIT Potential MS05-036 exploit - GIF with embedded ICC - Excessive Tag Count"; flow:established; content:"ICCRGBG1012"; byte_test:4,>,1024,129,relative,big; reference:url,www.microsoft.com/technet/security/Bulletin/MS05-036.mspx; reference:cve,CVE-2005-1219; classtype:misc-attack; reference:url,doc.emergingthreats.net/bin/view/Main/2002123; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/EXPLOIT/EXPLOIT_MS05-036; sid:2002123; rev:7;)
Added 2009-02-07 22:00:25 UTC
Many false positives. Suggested update:
tcp $EXTERNAL_NET !$SSL_PORTS -> $HOME_NET any (msg:"ET EXPLOIT Potential MS05-036 exploit - GIF with embedded ICC - Excessive Tag Count"; flow:established; content:"ICCRGBG1012"; byte_test:4,>,1024,129,relative,big; reference:url,www.microsoft.com/technet/security/Bulletin/MS05-036.mspx; reference:cve,CVE-2005-1219; classtype:misc-attack; reference:url,doc.emergingthreats.net/bin/view/Main/2002123; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/EXPLOIT/EXPLOIT_MS05-036; sid:2002123; rev:8;)
--
VladimirAnufriev - 27 Jul 2009
What was the change you made there? Not seeing it right off. Can you send to the emerging-sigs list as well? Thanks!
--
MattJonkman - 27 Jul 2009
alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"ET EXPLOIT Potential MS05-036 exploit - GIF with embedded ICC - Excessive Tag Count"; flow:established; content:"ICCRGBG1012"; byte_test:4,>,1024,129,relative,big; reference:url,www.microsoft.com/technet/security/Bulletin/MS05-036.mspx; reference:cve,CVE-2005-1219; classtype:misc-attack; reference:url,doc.emergingthreats.net/bin/view/Main/2002123; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/EXPLOIT/EXPLOIT_MS05-036; sid:2002123; rev:7;)
Added 2009-02-07 22:00:25 UTC
alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"ET EXPLOIT Potential MS05-036 exploit - GIF with embedded ICC - Excessive Tag Count"; flow:established; content:"ICCRGBG1012"; byte_test:4,>,1024,129,relative,big; reference:url,www.microsoft.com/technet/security/Bulletin/MS05-036.mspx; reference:cve,CVE-2005-1219; classtype:misc-attack; sid:2002123; rev:6;)
Added 2008-01-25 10:56:38 UTC
alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"ET EXPLOIT Potential MS05-036 exploit - GIF with embedded ICC - Excessive Tag Count"; flow:established; content:"ICCRGBG1012"; byte_test:4,>,1024,129,relative,big; reference:url,www.microsoft.com/technet/security/Bulletin/MS05-036.mspx; reference:cve,CVE-2005-1219; classtype:misc-attack; sid:2002123; rev:6;)
Added 2008-01-25 10:56:38 UTC
alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"BLEEDING-EDGE EXPLOIT Potential MS05-036 exploit - GIF with embedded ICC - Excessive Tag Count"; flow:established; content:"ICCRGBG1012"; byte_test:4,>,1024,129,relative,big; reference:url,www.microsoft.com/technet/security/Bulletin/MS05-036.mspx; reference:cve,CVE-2005-1219; classtype:misc-attack; sid:2002123; rev:5;)