alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"ET EXPLOIT MS05-036 exploit - JPEG ICC r/b/g/XYZ
GetColorProfileElement? overflow"; flow:established; content:"ICC_PROFILE|00|"; pcre:"/[rbg]XYZ/"; byte_test:4,!=,20,4,relative,big; reference:url,www.microsoft.com/technet/security/Bulletin/MS05-036.mspx; reference:cve,CVE-2005-1219; classtype:misc-attack; reference:url,doc.emergingthreats.net/bin/view/Main/2002134; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/EXPLOIT/EXPLOIT_MS05-036; sid:2002134; rev:5;)
Added 2009-02-07 22:00:25 UTC
False positives when SSL connection. Suggested update:
alert tcp $EXTERNAL_NET SSL_PORTS -> $HOME_NET any (msg:"ET EXPLOIT MS05-036 exploit - JPEG ICC r/b/g/XYZ
GetColorProfileElement? overflow"; flow:established; content:"ICC_PROFILE|00|"; pcre:"/[rbg]XYZ/"; byte_test:4,!=,20,4,relative,big; reference:url,www.microsoft.com/technet/security/Bulletin/MS05-036.mspx; reference:cve,CVE-2005-1219; classtype:misc-attack; reference:url,doc.emergingthreats.net/bin/view/Main/2002134; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/EXPLOIT/EXPLOIT_MS05-036; sid:2002134; rev:6;)
--
VladimirAnufriev - 28 Jul 2009
Sorry:
alert tcp $EXTERNAL_NET !$SSL_PORTS -> $HOME_NET any (msg:"ET EXPLOIT MS05-036 exploit - JPEG ICC r/b/g/XYZ
GetColorProfileElement?? overflow"; flow:established; content:"ICC_PROFILE|00|"; pcre:"/[rbg]XYZ/"; byte_test:4,!=,20,4,relative,big; reference:url,www.microsoft.com/technet/security/Bulletin/MS05-036.mspx; reference:cve,CVE-2005-1219; classtype:misc-attack; reference:url,doc.emergingthreats.net/bin/view/Main/2002134; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/EXPLOIT/EXPLOIT_MS05-036; sid:2002134; rev:6;)
--
VladimirAnufriev - 28 Jul 2009
alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"ET EXPLOIT MS05-036 exploit - JPEG ICC r/b/g/XYZ
GetColorProfileElement? overflow"; flow:established; content:"ICC_PROFILE|00|"; pcre:"/[rbg]XYZ/"; byte_test:4,!=,20,4,relative,big; reference:url,www.microsoft.com/technet/security/Bulletin/MS05-036.mspx; reference:cve,CVE-2005-1219; classtype:misc-attack; reference:url,doc.emergingthreats.net/bin/view/Main/2002134; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/EXPLOIT/EXPLOIT_MS05-036; sid:2002134; rev:5;)
Added 2009-02-07 22:00:25 UTC
alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"ET EXPLOIT MS05-036 exploit - JPEG ICC r/b/g/XYZ
GetColorProfileElement? overflow"; flow:established; content:"ICC_PROFILE|00|"; pcre:"/[rbg]XYZ/"; byte_test:4,!=,20,4,relative,big; reference:url,www.microsoft.com/technet/security/Bulletin/MS05-036.mspx; reference:cve,CVE-2005-1219; classtype:misc-attack; sid:2002134; rev:4;)
Added 2008-01-25 10:56:38 UTC
alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"ET EXPLOIT MS05-036 exploit - JPEG ICC r/b/g/XYZ
GetColorProfileElement? overflow"; flow:established; content:"ICC_PROFILE|00|"; pcre:"/[rbg]XYZ/"; byte_test:4,!=,20,4,relative,big; reference:url,www.microsoft.com/technet/security/Bulletin/MS05-036.mspx; reference:cve,CVE-2005-1219; classtype:misc-attack; sid:2002134; rev:4;)
Added 2008-01-25 10:56:38 UTC
alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"BLEEDING-EDGE EXPLOIT MS05-036 exploit - JPEG ICC r/b/g/XYZ
GetColorProfileElement? overflow"; flow:established; content:"ICC_PROFILE|00|"; pcre:"/[rbg]XYZ/"; byte_test:4,!=,20,4,relative,big; reference:url,www.microsoft.com/technet/security/Bulletin/MS05-036.mspx; reference:cve,CVE-2005-1219; classtype:misc-attack; sid:2002134; rev:3;)