##alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"ET ACTIVEX Nokia Phoenix Service Software ActiveX? Control Buffer Overflow"; flow:to_client,established; file_data; content:"F85B4A10-B530-4D68-A714-7415838FD174"; nocase; distance:0; content:"SelectDevice"; nocase; distance:0; reference:bugtraq,33726; reference:url,doc.emergingthreats.net/2009178; classtype:web-application-attack; sid:2009178; rev:10;)

Added 2011-10-12 19:26:47 UTC


##alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"ET ACTIVEX Nokia Phoenix Service Software ActiveX? Control Buffer Overflow"; flow:to_client,established; file_data; content:"F85B4A10-B530-4D68-A714-7415838FD174"; nocase; distance:0; content:"SelectDevice"; nocase; distance:0; classtype:web-application-attack; reference:bugtraq,33726; reference:url,doc.emergingthreats.net/2009178; sid:2009178; rev:10;)

Added 2011-09-14 22:40:10 UTC


##alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"ET ACTIVEX Nokia Phoenix Service Software ActiveX? Control Buffer Overflow"; flow:to_client,established; file_data; content:"F85B4A10-B530-4D68-A714-7415838FD174"; nocase; distance:0; content:"SelectDevice"; nocase; distance:0; classtype:web-application-attack; reference:bugtraq,33726; reference:url,doc.emergingthreats.net/2009178; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_CLIENT/WEB_Nokia_Phoenix; sid:2009178; rev:10;)

Added 2011-02-04 17:28:27 UTC


alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"ET WEB_CLIENT ACTIVEX Nokia Phoenix Service Software ActiveX? Control Buffer Overflow"; flow:to_client,established; content:"clsid"; nocase; content:"F85B4A10-B530-4D68-A714-7415838FD174"; nocase; distance:0; content:"SelectDevice"; nocase; classtype:web-application-attack; reference:bugtraq,33726; reference:url,doc.emergingthreats.net/2009178; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_CLIENT/WEB_Nokia_Phoenix; sid:2009178; rev:4;)

Added 2009-10-06 14:19:02 UTC


alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"ET WEB_CLIENT ACTIVEX Nokia Phoenix Service Software ActiveX? Control Buffer Overflow"; flow:to_client,established; content:"clsid"; nocase; content:"F85B4A10-B530-4D68-A714-7415838FD174"; nocase; distance:0; content:"SelectDevice"; nocase; classtype:web-application-attack; reference:bugtraq,33726; reference:url,doc.emergingthreats.net/2009178; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_CLIENT/WEB_Nokia_Phoenix; sid:2009178; rev:4;)

Added 2009-10-06 14:19:02 UTC


alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"ET WEB_CLIENT ACTIVEX Nokia Phoenix Service Software ActiveX? Control Buffer Overflow"; flow:to_client,established; content:"clsid"; nocase; content:"F85B4A10-B530-4D68-A714-7415838FD174"; nocase; distance:0; content:"SelectDevice"; nocase; classtype:web-application-attack; reference:bugtraq,33726; reference:url,doc.emergingthreats.net/2009178; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_CLIENT/WEB_Nokia_Phoenix; sid:2009178; rev:4;)

Added 2009-10-06 14:15:48 UTC


alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"ET WEB_CLIENT ACTIVEX Nokia Phoenix Service Software ActiveX? Control Buffer Overflow"; flow:to_client,established; content:"clsid"; nocase; content:"F85B4A10-B530-4D68-A714-7415838FD174"; nocase; distance:0; content:"SelectDevice"; nocase; classtype:web-application-attack; reference:bugtraq,33726; reference:url,doc.emergingthreats.net/2009178; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_CLIENT/WEB_Nokia_Phoenix; sid:2009178; rev:4;)

Added 2009-10-06 14:15:48 UTC


alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"ET WEB_ACTIVEX Nokia Phoenix Service Software ActiveX? Control Buffer Overflow"; flow:to_client,established; content:"clsid"; nocase; content:"F85B4A10-B530-4D68-A714-7415838FD174"; nocase; distance:0; content:"SelectDevice"; nocase; classtype:web-application-attack; reference:bugtraq,33726; reference:url,doc.emergingthreats.net/2009178; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB/WEB_Nokia_Phoenix; sid:2009178; rev:2;)

Added 2009-03-30 21:00:25 UTC


alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"ET WEB_ACTIVEX Nokia Phoenix Service Software ActiveX? Control Buffer Overflow"; flow:to_client,established; content:"clsid"; nocase; content:"F85B4A10-B530-4D68-A714-7415838FD174"; nocase; distance:0; content:"SelectDevice"; nocase; classtype:web-application-attack; reference:bugtraq,33726; reference:url,doc.emergingthreats.net/2009178; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB/WEB_Nokia_Phoenix; sid:2009178; rev:2;)

Added 2009-03-30 21:00:25 UTC


alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"ET WEB_ACTIVEX Nokia Phoenix Service Software ActiveX? Control Buffer Overflow"; flow:to_client,established; content:"clsid"; nocase; content:"F85B4A10-B530-4D68-A714-7415838FD174"; nocase; distance:0; content:"SelectDevice"; nocase; classtype:web-application-attack; reference:bugtraq,33726; sid:2009178; rev:1;)

Added 2009-03-30 11:45:25 UTC


alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"ET WEB_ACTIVEX Nokia Phoenix Service Software ActiveX? Control Buffer Overflow"; flow:to_client,established; content:"clsid"; nocase; content:"F85B4A10-B530-4D68-A714-7415838FD174"; nocase; distance:0; content:"SelectDevice"; nocase; classtype:web-application-attack; reference:bugtraq,33726; sid:2009178; rev:1;)

Added 2009-03-30 11:43:51 UTC


Topic revision: r1 - 2011-10-12 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats