alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"ET EXPLOIT MS05-036 exploit - JPEG ICC r/b/g/XYZ GetColorProfileElement? overflow"; flow:established; content:"ICC_PROFILE|00|"; pcre:"/[rbg]XYZ/"; byte_test:4,!=,20,4,relative,big; reference:url,www.microsoft.com/technet/security/Bulletin/MS05-036.mspx; reference:cve,CVE-2005-1219; classtype:misc-attack; reference:url,doc.emergingthreats.net/bin/view/Main/2002134; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/EXPLOIT/EXPLOIT_MS05-036; sid:2002134; rev:5;)

Added 2009-02-07 22:00:25 UTC

False positives when SSL connection. Suggested update: alert tcp $EXTERNAL_NET SSL_PORTS -> $HOME_NET any (msg:"ET EXPLOIT MS05-036 exploit - JPEG ICC r/b/g/XYZ GetColorProfileElement? overflow"; flow:established; content:"ICC_PROFILE|00|"; pcre:"/[rbg]XYZ/"; byte_test:4,!=,20,4,relative,big; reference:url,www.microsoft.com/technet/security/Bulletin/MS05-036.mspx; reference:cve,CVE-2005-1219; classtype:misc-attack; reference:url,doc.emergingthreats.net/bin/view/Main/2002134; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/EXPLOIT/EXPLOIT_MS05-036; sid:2002134; rev:6;)

-- VladimirAnufriev - 28 Jul 2009

Sorry: alert tcp $EXTERNAL_NET !$SSL_PORTS -> $HOME_NET any (msg:"ET EXPLOIT MS05-036 exploit - JPEG ICC r/b/g/XYZ GetColorProfileElement?? overflow"; flow:established; content:"ICC_PROFILE|00|"; pcre:"/[rbg]XYZ/"; byte_test:4,!=,20,4,relative,big; reference:url,www.microsoft.com/technet/security/Bulletin/MS05-036.mspx; reference:cve,CVE-2005-1219; classtype:misc-attack; reference:url,doc.emergingthreats.net/bin/view/Main/2002134; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/EXPLOIT/EXPLOIT_MS05-036; sid:2002134; rev:6;)

-- VladimirAnufriev - 28 Jul 2009


alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"ET EXPLOIT MS05-036 exploit - JPEG ICC r/b/g/XYZ GetColorProfileElement? overflow"; flow:established; content:"ICC_PROFILE|00|"; pcre:"/[rbg]XYZ/"; byte_test:4,!=,20,4,relative,big; reference:url,www.microsoft.com/technet/security/Bulletin/MS05-036.mspx; reference:cve,CVE-2005-1219; classtype:misc-attack; reference:url,doc.emergingthreats.net/bin/view/Main/2002134; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/EXPLOIT/EXPLOIT_MS05-036; sid:2002134; rev:5;)

Added 2009-02-07 22:00:25 UTC


alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"ET EXPLOIT MS05-036 exploit - JPEG ICC r/b/g/XYZ GetColorProfileElement? overflow"; flow:established; content:"ICC_PROFILE|00|"; pcre:"/[rbg]XYZ/"; byte_test:4,!=,20,4,relative,big; reference:url,www.microsoft.com/technet/security/Bulletin/MS05-036.mspx; reference:cve,CVE-2005-1219; classtype:misc-attack; sid:2002134; rev:4;)

Added 2008-01-25 10:56:38 UTC


alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"ET EXPLOIT MS05-036 exploit - JPEG ICC r/b/g/XYZ GetColorProfileElement? overflow"; flow:established; content:"ICC_PROFILE|00|"; pcre:"/[rbg]XYZ/"; byte_test:4,!=,20,4,relative,big; reference:url,www.microsoft.com/technet/security/Bulletin/MS05-036.mspx; reference:cve,CVE-2005-1219; classtype:misc-attack; sid:2002134; rev:4;)

Added 2008-01-25 10:56:38 UTC


alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"BLEEDING-EDGE EXPLOIT MS05-036 exploit - JPEG ICC r/b/g/XYZ GetColorProfileElement? overflow"; flow:established; content:"ICC_PROFILE|00|"; pcre:"/[rbg]XYZ/"; byte_test:4,!=,20,4,relative,big; reference:url,www.microsoft.com/technet/security/Bulletin/MS05-036.mspx; reference:cve,CVE-2005-1219; classtype:misc-attack; sid:2002134; rev:3;)



Topic revision: r2 - 2009-07-28 - VladimirAnufriev
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats