alert http $EXTERNAL_NET any -> $HOME_NET any (msg:"ET EXPLOIT Possible Inbound Flash Exploit (CVE-2018-15982)"; flow:established,from_server; content:"200"; http_stat_code; http_content_type; content:"application|2f|x-shockwave-flash"; file_data; content:"FWS"; depth:3; content:"cmd.exe|20 2f|c"; distance:0; nocase; fast_pattern; metadata: former_category EXPLOIT; reference:url,www.malware-traffic-analysis.net/2019/08/01/index.html; classtype:attempted-user; sid:2027789; rev:1; metadata:attack_target Client_Endpoint, deployment Perimeter, signature_severity Major, created_at 2019_08_02, performance_impact Low, updated_at 2019_08_02;)

Added 2019-08-02 19:14:14 UTC


Topic revision: r1 - 2019-08-02 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats