alert http $EXTERNAL_NET any -> $HOME_NET any (msg:"ET EXPLOIT Possible Inbound Flash Exploit with Stack-Based wininet"; flow:established,from_server; content:"200"; http_stat_code; http_content_type; content:"application|2f|x-shockwave-flash"; file_data; content:"FWS"; depth:3; content:"hnet|00|hwini"; fast_pattern; distance:0; nocase; within:1000; content:".exe|00|"; pcre:"/^.{1,10}(?:(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.){3}(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)/R"; metadata: former_category EXPLOIT; classtype:attempted-user; sid:2027790; rev:1; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, deployment Perimeter, tag Exploit, signature_severity Major, created_at 2019_08_02, performance_impact Low, updated_at 2019_08_02;)

Added 2019-08-02 19:14:14 UTC


Topic revision: r1 - 2019-08-02 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats