# alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"ET WEB_CLIENT Possible Windows Media Encoder 9 wmex.dll ActiveX? GetDetailsString? Buffer Overflow Attempt"; flow:established,to_client; content:"clsid"; nocase; content:"A8D3AD02-7508-4004-B2E9-AD33F087F43C"; nocase; distance:0; content:"GetDetailsString"; nocase; pcre:"/<OBJECT\s+[^>]*classid\s*=\s*[\x22\x27]?\s*clsid\s*\x3a\s*\x7B?\s*A8D3AD02-7508-4004-B2E9-AD33F087F43C/si"; classtype:attempted-user; reference:url,www.securityfocus.com/bid/31065; reference:cve,2008-3008; reference:url,doc.emergingthreats.net/2010689; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_CLIENT/WEB_MS_wmex; sid:2010689; rev:2;)

Added 2010-01-20 15:31:11 UTC


Topic revision: r1 - 2010-01-20 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats