alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"ET WEB_CLIENT ACTIVEX COM Object MS06-042 (group 1)"; flow:established,from_server; flowbits:isset,CLSID_DETECTED; pcre:"/5DFB2651-9668-11D0-B17B-00C04FC2A0CA|39A2C2A6-4778-11D2-9BDB-204C4F4F5020|3DA2AA3E-3D96-11D2-9BD2-204C4F4F5020|E8C31D11-6FD2-4659-AD75-155FA143F42B|44C79591-D0DE-49C4-BA3C-A45AB7003356|01002B17-5D93-4551-81E4-831FEF780A53|1B544C24-FD0B-11CE-8C63-00AA0044B520|1CB1623E-BBEC-4E8D-B2DF-DC08C6F4627C|2D20D4BB-B47E-4FB7-83BD-E3C2EE250D26|2EA10031-0033-450E-8072-E27D9E768142|31087270-D348-432C-899E-2D2F38FF29A0|41D2B841-7692-4C83-AFD3-F60E845341AF/i"; classtype:web-application-attack; reference:cve,2006-3638; reference:url,www.microsoft.com/technet/security/Bulletin/MS06-042.mspx; reference:url,doc.emergingthreats.net/2003077; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_CLIENT/WEB_MS06-042; sid:2003077; rev:7;)

Added 2009-10-06 14:19:02 UTC


alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"ET WEB_CLIENT ACTIVEX COM Object MS06-042 (group 1)"; flow:established,from_server; flowbits:isset,CLSID_DETECTED; pcre:"/5DFB2651-9668-11D0-B17B-00C04FC2A0CA|39A2C2A6-4778-11D2-9BDB-204C4F4F5020|3DA2AA3E-3D96-11D2-9BD2-204C4F4F5020|E8C31D11-6FD2-4659-AD75-155FA143F42B|44C79591-D0DE-49C4-BA3C-A45AB7003356|01002B17-5D93-4551-81E4-831FEF780A53|1B544C24-FD0B-11CE-8C63-00AA0044B520|1CB1623E-BBEC-4E8D-B2DF-DC08C6F4627C|2D20D4BB-B47E-4FB7-83BD-E3C2EE250D26|2EA10031-0033-450E-8072-E27D9E768142|31087270-D348-432C-899E-2D2F38FF29A0|41D2B841-7692-4C83-AFD3-F60E845341AF/i"; classtype:web-application-attack; reference:cve,2006-3638; reference:url,www.microsoft.com/technet/security/Bulletin/MS06-042.mspx; reference:url,doc.emergingthreats.net/2003077; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_CLIENT/WEB_MS06-042; sid:2003077; rev:7;)

Added 2009-10-06 14:19:02 UTC


alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"ET WEB_CLIENT ACTIVEX COM Object MS06-042 (group 1)"; flow:established,from_server; flowbits:isset,CLSID_DETECTED; pcre:"/5DFB2651-9668-11D0-B17B-00C04FC2A0CA|39A2C2A6-4778-11D2-9BDB-204C4F4F5020|3DA2AA3E-3D96-11D2-9BD2-204C4F4F5020|E8C31D11-6FD2-4659-AD75-155FA143F42B|44C79591-D0DE-49C4-BA3C-A45AB7003356|01002B17-5D93-4551-81E4-831FEF780A53|1B544C24-FD0B-11CE-8C63-00AA0044B520|1CB1623E-BBEC-4E8D-B2DF-DC08C6F4627C|2D20D4BB-B47E-4FB7-83BD-E3C2EE250D26|2EA10031-0033-450E-8072-E27D9E768142|31087270-D348-432C-899E-2D2F38FF29A0|41D2B841-7692-4C83-AFD3-F60E845341AF/i"; classtype:web-application-attack; reference:cve,2006-3638; reference:url,www.microsoft.com/technet/security/Bulletin/MS06-042.mspx; reference:url,doc.emergingthreats.net/2003077; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_CLIENT/WEB_MS06-042; sid:2003077; rev:7;)

Added 2009-10-06 14:15:48 UTC


alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"ET WEB_CLIENT ACTIVEX COM Object MS06-042 (group 1)"; flow:established,from_server; flowbits:isset,CLSID_DETECTED; pcre:"/5DFB2651-9668-11D0-B17B-00C04FC2A0CA|39A2C2A6-4778-11D2-9BDB-204C4F4F5020|3DA2AA3E-3D96-11D2-9BD2-204C4F4F5020|E8C31D11-6FD2-4659-AD75-155FA143F42B|44C79591-D0DE-49C4-BA3C-A45AB7003356|01002B17-5D93-4551-81E4-831FEF780A53|1B544C24-FD0B-11CE-8C63-00AA0044B520|1CB1623E-BBEC-4E8D-B2DF-DC08C6F4627C|2D20D4BB-B47E-4FB7-83BD-E3C2EE250D26|2EA10031-0033-450E-8072-E27D9E768142|31087270-D348-432C-899E-2D2F38FF29A0|41D2B841-7692-4C83-AFD3-F60E845341AF/i"; classtype:web-application-attack; reference:cve,2006-3638; reference:url,www.microsoft.com/technet/security/Bulletin/MS06-042.mspx; reference:url,doc.emergingthreats.net/2003077; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_CLIENT/WEB_MS06-042; sid:2003077; rev:7;)

Added 2009-10-06 14:15:48 UTC


alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"ET WEB_ACTIVEX COM Object MS06-042 (group 1)"; flow:established,from_server; flowbits:isset,CLSID_DETECTED; pcre:"/5DFB2651-9668-11D0-B17B-00C04FC2A0CA|39A2C2A6-4778-11D2-9BDB-204C4F4F5020|3DA2AA3E-3D96-11D2-9BD2-204C4F4F5020|E8C31D11-6FD2-4659-AD75-155FA143F42B|44C79591-D0DE-49C4-BA3C-A45AB7003356|01002B17-5D93-4551-81E4-831FEF780A53|1B544C24-FD0B-11CE-8C63-00AA0044B520|1CB1623E-BBEC-4E8D-B2DF-DC08C6F4627C|2D20D4BB-B47E-4FB7-83BD-E3C2EE250D26|2EA10031-0033-450E-8072-E27D9E768142|31087270-D348-432C-899E-2D2F38FF29A0|41D2B841-7692-4C83-AFD3-F60E845341AF/i"; classtype:web-application-attack; reference:cve,2006-3638; reference:url,www.microsoft.com/technet/security/Bulletin/MS06-042.mspx; reference:url,doc.emergingthreats.net/2003077; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB/WEB_MS06-042; sid:2003077; rev:5;)

Added 2009-02-16 21:46:08 UTC


alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"ET WEB_ACTIVEX COM Object MS06-042 (group 1)"; flow:established,from_server; flowbits:isset,CLSID_DETECTED; pcre:"/5DFB2651-9668-11D0-B17B-00C04FC2A0CA|39A2C2A6-4778-11D2-9BDB-204C4F4F5020|3DA2AA3E-3D96-11D2-9BD2-204C4F4F5020|E8C31D11-6FD2-4659-AD75-155FA143F42B|44C79591-D0DE-49C4-BA3C-A45AB7003356|01002B17-5D93-4551-81E4-831FEF780A53|1B544C24-FD0B-11CE-8C63-00AA0044B520|1CB1623E-BBEC-4E8D-B2DF-DC08C6F4627C|2D20D4BB-B47E-4FB7-83BD-E3C2EE250D26|2EA10031-0033-450E-8072-E27D9E768142|31087270-D348-432C-899E-2D2F38FF29A0|41D2B841-7692-4C83-AFD3-F60E845341AF/i"; classtype:web-application-attack; reference:cve,2006-3638; reference:url,www.microsoft.com/technet/security/Bulletin/MS06-042.mspx; reference:url,doc.emergingthreats.net/2003077; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB/WEB_MS06-042; sid:2003077; rev:5;)

Added 2009-02-16 21:46:08 UTC


alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"ET WEB_ACTIVEX COM Object MS06-042 (group 1)"; flow:established,from_server; flowbits:isset,CLSID_DETECTED; pcre:"/5DFB2651-9668-11D0-B17B-00C04FC2A0CA|39A2C2A6-4778-11D2-9BDB-204C4F4F5020|3DA2AA3E-3D96-11D2-9BD2-204C4F4F5020|E8C31D11-6FD2-4659-AD75-155FA143F42B|44C79591-D0DE-49C4-BA3C-A45AB7003356|01002B17-5D93-4551-81E4-831FEF780A53|1B544C24-FD0B-11CE-8C63-00AA0044B520|1CB1623E-BBEC-4E8D-B2DF-DC08C6F4627C|2D20D4BB-B47E-4FB7-83BD-E3C2EE250D26|2EA10031-0033-450E-8072-E27D9E768142|31087270-D348-432C-899E-2D2F38FF29A0|41D2B841-7692-4C83-AFD3-F60E845341AF/i"; classtype:web-application-attack; reference:cve,2006-3638; reference:url,www.microsoft.com/technet/security/Bulletin/MS06-042.mspx; reference:url,doc.emergingthreats.net/2003077; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB/WEB_MS06-042; sid:2003077; rev:5;)

Added 2009-02-16 21:45:24 UTC


alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"ET WEB_ACTIVEX COM Object MS06-042 (group 1)"; flow:established,from_server; flowbits:isset,CLSID_DETECTED; pcre:"/5DFB2651-9668-11D0-B17B-00C04FC2A0CA|39A2C2A6-4778-11D2-9BDB-204C4F4F5020|3DA2AA3E-3D96-11D2-9BD2-204C4F4F5020|E8C31D11-6FD2-4659-AD75-155FA143F42B|44C79591-D0DE-49C4-BA3C-A45AB7003356|01002B17-5D93-4551-81E4-831FEF780A53|1B544C24-FD0B-11CE-8C63-00AA0044B520|1CB1623E-BBEC-4E8D-B2DF-DC08C6F4627C|2D20D4BB-B47E-4FB7-83BD-E3C2EE250D26|2EA10031-0033-450E-8072-E27D9E768142|31087270-D348-432C-899E-2D2F38FF29A0|41D2B841-7692-4C83-AFD3-F60E845341AF/i"; classtype:web-application-attack; reference:cve,2006-3638; reference:url,www.microsoft.com/technet/security/Bulletin/MS06-042.mspx; reference:url,doc.emergingthreats.net/2003077; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB/WEB_MS06-042; sid:2003077; rev:5;)

Added 2009-02-16 21:45:24 UTC


alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"ET WEB_ACTIVEX COM Object MS06-042 (group 1)"; flow:established,from_server; flowbits:isset,CLSID_DETECTED; pcre:"/5DFB2651-9668-11D0-B17B-00C04FC2A0CA|39A2C2A6-4778-11D2-9BDB-204C4F4F5020|3DA2AA3E-3D96-11D2-9BD2-204C4F4F5020|E8C31D11-6FD2-4659-AD75-155FA143F42B|44C79591-D0DE-49C4-BA3C-A45AB7003356|01002B17-5D93-4551-81E4-831FEF780A53|1B544C24-FD0B-11CE-8C63-00AA0044B520|1CB1623E-BBEC-4E8D-B2DF-DC08C6F4627C|2D20D4BB-B47E-4FB7-83BD-E3C2EE250D26|2EA10031-0033-450E-8072-E27D9E768142|31087270-D348-432C-899E-2D2F38FF29A0|41D2B841-7692-4C83-AFD3-F60E845341AF/i"; classtype:web-application-attack; reference:cve,2006-3638; reference:url,www.microsoft.com/technet/security/Bulletin/MS06-042.mspx; sid:2003077; rev:4;)

Added 2008-11-25 09:49:36 UTC


alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"ET WEB_ACTIVEX COM Object MS06-042 (group 1)"; flow:established,from_server; flowbits:isset,CLSID_DETECTED; pcre:"/5DFB2651-9668-11D0-B17B-00C04FC2A0CA|39A2C2A6-4778-11D2-9BDB-204C4F4F5020|3DA2AA3E-3D96-11D2-9BD2-204C4F4F5020|E8C31D11-6FD2-4659-AD75-155FA143F42B|44C79591-D0DE-49C4-BA3C-A45AB7003356|01002B17-5D93-4551-81E4-831FEF780A53|1B544C24-FD0B-11CE-8C63-00AA0044B520|1CB1623E-BBEC-4E8D-B2DF-DC08C6F4627C|2D20D4BB-B47E-4FB7-83BD-E3C2EE250D26|2EA10031-0033-450E-8072-E27D9E768142|31087270-D348-432C-899E-2D2F38FF29A0|41D2B841-7692-4C83-AFD3-F60E845341AF/i"; classtype:web-application-attack; reference:cve,2006-3638; reference:url,www.microsoft.com/technet/security/Bulletin/MS06-042.mspx; sid:2003077; rev:4;)

Added 2008-11-25 09:49:36 UTC


alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"ET WEB_ACTIVEX COM Object MS06-042 (group 1)"; flow:established,from_server; flowbits:isset,CLSID_DETECTED; pcre:"/5DFB2651-9668-11D0-B17B-00C04FC2A0CA|39A2C2A6-4778-11D2-9BDB-204C4F4F5020|3DA2AA3E-3D96-11D2-9BD2-204C4F4F5020|E8C31D11-6FD2-4659-AD75-155FA143F42B|44C79591-D0DE-49C4-BA3C-A45AB7003356|01002B17-5D93-4551-81E4-831FEF780A53|1B544C24-FD0B-11CE-8C63-00AA0044B520|1CB1623E-BBEC-4E8D-B2DF-DC08C6F4627C|2D20D4BB-B47E-4FB7-83BD-E3C2EE250D26|2EA10031-0033-450E-8072-E27D9E768142|31087270-D348-432C-899E-2D2F38FF29A0|41D2B841-7692-4C83-AFD3-F60E845341AF/i"; classtype:web-application-attack; reference:cve,2006-3638; reference:url,www.microsoft.com/technet/security/Bulletin/MS06-042.mspx; sid:2003077; rev:4;)

Added 2008-11-25 09:45:22 UTC


alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"ET WEB_ACTIVEX COM Object MS06-042 (group 1)"; flow:established,from_server; flowbits:isset,CLSID_DETECTED; pcre:"/5DFB2651-9668-11D0-B17B-00C04FC2A0CA|39A2C2A6-4778-11D2-9BDB-204C4F4F5020|3DA2AA3E-3D96-11D2-9BD2-204C4F4F5020|E8C31D11-6FD2-4659-AD75-155FA143F42B|44C79591-D0DE-49C4-BA3C-A45AB7003356|01002B17-5D93-4551-81E4-831FEF780A53|1B544C24-FD0B-11CE-8C63-00AA0044B520|1CB1623E-BBEC-4E8D-B2DF-DC08C6F4627C|2D20D4BB-B47E-4FB7-83BD-E3C2EE250D26|2EA10031-0033-450E-8072-E27D9E768142|31087270-D348-432C-899E-2D2F38FF29A0|41D2B841-7692-4C83-AFD3-F60E845341AF/i"; classtype:web-application-attack; reference:cve,2006-3638; reference:url,www.microsoft.com/technet/security/Bulletin/MS06-042.mspx; sid:2003077; rev:4;)

Added 2008-11-25 09:45:22 UTC


alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"ET EXPLOIT COM Object MS06-042 (group 1)"; flow:established,from_server; flowbits:isset,CLSID_DETECTED; pcre:"/5DFB2651-9668-11D0-B17B-00C04FC2A0CA|39A2C2A6-4778-11D2-9BDB-204C4F4F5020|3DA2AA3E-3D96-11D2-9BD2-204C4F4F5020|E8C31D11-6FD2-4659-AD75-155FA143F42B|44C79591-D0DE-49C4-BA3C-A45AB7003356|01002B17-5D93-4551-81E4-831FEF780A53|1B544C24-FD0B-11CE-8C63-00AA0044B520|1CB1623E-BBEC-4E8D-B2DF-DC08C6F4627C|2D20D4BB-B47E-4FB7-83BD-E3C2EE250D26|2EA10031-0033-450E-8072-E27D9E768142|31087270-D348-432C-899E-2D2F38FF29A0|41D2B841-7692-4C83-AFD3-F60E845341AF/i"; classtype:web-application-attack; reference:cve,2006-3638; reference:url,www.microsoft.com/technet/security/Bulletin/MS06-042.mspx; sid:2003077; rev:3;)

Added 2008-01-25 10:56:38 UTC


alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"ET EXPLOIT COM Object MS06-042 (group 1)"; flow:established,from_server; flowbits:isset,CLSID_DETECTED; pcre:"/5DFB2651-9668-11D0-B17B-00C04FC2A0CA|39A2C2A6-4778-11D2-9BDB-204C4F4F5020|3DA2AA3E-3D96-11D2-9BD2-204C4F4F5020|E8C31D11-6FD2-4659-AD75-155FA143F42B|44C79591-D0DE-49C4-BA3C-A45AB7003356|01002B17-5D93-4551-81E4-831FEF780A53|1B544C24-FD0B-11CE-8C63-00AA0044B520|1CB1623E-BBEC-4E8D-B2DF-DC08C6F4627C|2D20D4BB-B47E-4FB7-83BD-E3C2EE250D26|2EA10031-0033-450E-8072-E27D9E768142|31087270-D348-432C-899E-2D2F38FF29A0|41D2B841-7692-4C83-AFD3-F60E845341AF/i"; classtype:web-application-attack; reference:cve,2006-3638; reference:url,www.microsoft.com/technet/security/Bulletin/MS06-042.mspx; sid:2003077; rev:3;)

Added 2008-01-25 10:56:38 UTC


alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"BLEEDING-EDGE EXPLOIT COM Object MS06-042 (group 1)"; flow:established,from_server; flowbits:isset,CLSID_DETECTED; pcre:"/5DFB2651-9668-11D0-B17B-00C04FC2A0CA|39A2C2A6-4778-11D2-9BDB-204C4F4F5020|3DA2AA3E-3D96-11D2-9BD2-204C4F4F5020|E8C31D11-6FD2-4659-AD75-155FA143F42B|44C79591-D0DE-49C4-BA3C-A45AB7003356|01002B17-5D93-4551-81E4-831FEF780A53|1B544C24-FD0B-11CE-8C63-00AA0044B520|1CB1623E-BBEC-4E8D-B2DF-DC08C6F4627C|2D20D4BB-B47E-4FB7-83BD-E3C2EE250D26|2EA10031-0033-450E-8072-E27D9E768142|31087270-D348-432C-899E-2D2F38FF29A0|41D2B841-7692-4C83-AFD3-F60E845341AF/i"; classtype:web-application-attack; reference:cve,2006-3638; reference:url,www.microsoft.com/technet/security/Bulletin/MS06-042.mspx; sid:2003077; rev:2;)



Topic revision: r1 - 2009-10-06 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats