#alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg: "ET DOS HTTP GET with newline appended"; flowbits:noalert; flow: to_server,established; content:"GET / HTTP/1.0|0a|"; offset: 0; depth: 15; flowbits:set,http.get; reference:cve,2004-0942; classtype: attempted-dos; reference:url,doc.emergingthreats.net/bin/view/Main/2001635; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/DOS/DOS_Apache_Squ1rt; sid: 2001635; rev:8;)

Added 2010-01-12 10:00:45 UTC


#alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg: "ET DOS HTTP GET with newline appended"; flowbits:noalert; flow: to_server,established; content:"GET / HTTP/1.0|0a|"; offset: 0; depth: 15; flowbits:set,http.get; reference:cve,2004-0942; classtype: attempted-dos; reference:url,doc.emergingthreats.net/bin/view/Main/2001635; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/DOS/DOS_Apache_Squ1rt; sid: 2001635; rev:8;)

Added 2010-01-12 10:00:45 UTC


alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg: "ET DOS HTTP GET with newline appended"; flowbits:noalert; flow: to_server,established; content:"GET / HTTP/1.0|0a|"; offset: 0; depth: 15; flowbits:set,http.get; reference:cve,2004-0942; classtype: attempted-dos; reference:url,doc.emergingthreats.net/bin/view/Main/2001635; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/DOS/DOS_Apache_Squ1rt; sid: 2001635; rev:8;)

Added 2009-02-06 19:00:55 UTC


alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg: "ET DOS HTTP GET with newline appended"; flowbits:noalert; flow: to_server,established; content:"GET / HTTP/1.0|0a|"; offset: 0; depth: 15; flowbits:set,http.get; reference:cve,2004-0942; classtype: attempted-dos; reference:url,doc.emergingthreats.net/bin/view/Main/2001635; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/DOS/DOS_Apache_Squ1rt; sid: 2001635; rev:8;)

Added 2009-02-06 19:00:55 UTC


alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg: "ET DOS HTTP GET with newline appended"; flowbits:noalert; flow: to_server,established; content:"GET / HTTP/1.0|0a|"; offset: 0; depth: 15; flowbits:set,http.get; reference:cve,2004-0942; classtype: attempted-dos; sid: 2001635; rev:7;)

Added 2008-01-25 10:03:39 UTC


alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg: "ET DOS HTTP GET with newline appended"; flowbits:noalert; flow: to_server,established; content:"GET / HTTP/1.0|0a|"; offset: 0; depth: 15; flowbits:set,http.get; reference:cve,2004-0942; classtype: attempted-dos; sid: 2001635; rev:7;)

Added 2008-01-25 10:03:39 UTC


alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg: "BLEEDING-EDGE DOS HTTP GET with newline appended"; flowbits:noalert; flow: to_server,established; content:"GET / HTTP/1.0|0a|"; offset: 0; depth: 15; flowbits:set,http.get; reference:cve,2004-0942; classtype: attempted-dos; sid: 2001635; rev:6; )



Topic revision: r1 - 2010-01-12 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats