alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"ET CURRENT_EVENTS Visio Viewer 2002-2007 Activex Remote Code Excution Attempt(MS09-055)"; flow:established,to_client; content:"clsid"; nocase; content:"279D6C9A-652E-4833-BEFC-312CA8887857"; nocase; distance:0; content:"OleLoadFromStream"; nocase; pcre:"/<OBJECT\s+[^>]*classid\s*=\s*[\x22\x27]?\s*clsid\s*\x3a\s*\x7B?\s*279D6C9A-652E-4833-BEFC-312CA8887857/si"; classtype:web-application-attack; reference:url,www.microsoft.com/technet/security/bulletin/MS09-055.mspx; reference:cve,CVE-2009-2493; reference:url,doc.emergingthreats.net/2010107; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/CURRENT_EVENTS/CURRENT_Patch_Tuesday; sid:2010107; rev:3;)

Added 2009-10-15 10:15:40 UTC


alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"ET CURRENT_EVENTS Visio Viewer 2002-2007 Activex Remote Code Excution Attempt(MS09-055)"; flow:established,to_client; content:"clsid"; nocase; content:"279D6C9A-652E-4833-BEFC-312CA8887857"; nocase; distance:0; content:"OleLoadFromStream"; nocase; pcre:"/<OBJECT\s+[^>]*classid\s*=\s*[\x22\x27]?\s*clsid\s*\x3a\s*\x7B?\s*279D6C9A-652E-4833-BEFC-312CA8887857/si"; classtype:web-application-attack; reference:url,www.microsoft.com/technet/security/bulletin/MS09-055.mspx; reference:cve,CVE-2009-2493; reference:url,doc.emergingthreats.net/2010107; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/CURRENT_EVENTS/CURRENT_Patch_Tuesday; sid:2010107; rev:3;)

Added 2009-10-15 10:15:40 UTC


#alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"ET CURRENT_EVENTS Visio Viewer 2002-2007 Activex Remote Code Excution Attempt(MS09-055)"; flow:established,to_client; content:"clsid"; nocase; content:"279D6C9A-652E-4833-BEFC-312CA8887857"; nocase; distance:0; content:"OleLoadFromStream"; nocase; pcre:"/<object\s*[^>]*\s*classid\s*=\s*(?P\x22|\x27|)\s*clsid\s*\x3a\s*{?\s*279D6C9A-652E-4833-BEFC-312CA8887857\s*}?\s*(?P=q1)(\s|>)/si"; classtype:web-application-attack; reference:url,www.microsoft.com/technet/security/bulletin/MS09-055.mspx; reference:cve,CVE-2009-2493; reference:url,doc.emergingthreats.net/2010107; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/CURRENT_EVENTS/CURRENT_Patch_Tuesday; sid:2010107; rev:2;)

Added 2009-10-14 20:45:37 UTC


#alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"ET CURRENT_EVENTS Visio Viewer 2002-2007 Activex Remote Code Excution Attempt(MS09-055)"; flow:established,to_client; content:"clsid"; nocase; content:"279D6C9A-652E-4833-BEFC-312CA8887857"; nocase; distance:0; content:"OleLoadFromStream"; nocase; pcre:"/<object\s*[^>]*\s*classid\s*=\s*(?P\x22|\x27|)\s*clsid\s*\x3a\s*{?\s*279D6C9A-652E-4833-BEFC-312CA8887857\s*}?\s*(?P=q1)(\s|>)/si"; classtype:web-application-attack; reference:url,www.microsoft.com/technet/security/bulletin/MS09-055.mspx; reference:cve,CVE-2009-2493; reference:url,doc.emergingthreats.net/2010107; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/CURRENT_EVENTS/CURRENT_Patch_Tuesday; sid:2010107; rev:2;)

Added 2009-10-14 20:45:37 UTC


#alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"ET CURRENT_EVENTS Visio Viewer 2002-2007 Activex Remote Code Excution Attempt(MS09-055)"; flow:established,to_client; content:"clsid"; nocase; content:"279D6C9A-652E-4833-BEFC-312CA8887857"; nocase; distance:0; content:"OleLoadFromStream"; nocase; pcre:"/<object\s*[^>]*\s*classid\s*=\s*(?P\x22|\x27|)\s*clsid\s*\x3a\s*{?\s*279D6C9A-652E-4833-BEFC-312CA8887857\s*}?\s*(?P=q1)(\s|>)/si"; classtype:web-application-attack; reference:url,www.microsoft.com/technet/security/bulletin/MS09-055.mspx; reference:cve,CVE-2009-2493; sid:2010107; rev:1;)

Added 2009-10-14 16:30:39 UTC


Topic revision: r1 - 2009-10-15 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats