alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET EXPLOIT Quicktime .mov File Requested"; flow:established,to_server; uricontent: ".mov"; flowbits:set,BE.movuri; flowbits:noalert; classtype:not-suspicious; reference:url,doc.emergingthreats.net/bin/view/Main/2003206; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/EXPLOIT/EXPLOIT_MOV_Javascript; sid:2003206; rev:3;)
Added 2009-02-07 22:00:25 UTC
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET EXPLOIT Quicktime .mov File Requested"; flow:established,to_server; uricontent: ".mov"; flowbits:set,BE.movuri; flowbits:noalert; classtype:not-suspicious; reference:url,doc.emergingthreats.net/bin/view/Main/2003206; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/EXPLOIT/EXPLOIT_MOV_Javascript; sid:2003206; rev:3;)
Added 2009-02-07 22:00:25 UTC
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET EXPLOIT Quicktime .mov File Requested"; flow:established,to_server; uricontent: ".mov"; flowbits:set,BE.movuri; flowbits:noalert; classtype:not-suspicious; sid:2003206; rev:2;)
Added 2008-01-25 10:56:37 UTC
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET EXPLOIT Quicktime .mov File Requested"; flow:established,to_server; uricontent: ".mov"; flowbits:set,BE.movuri; flowbits:noalert; classtype:not-suspicious; sid:2003206; rev:2;)
Added 2008-01-25 10:56:37 UTC
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"BLEEDING-EDGE EXPLOIT Quicktime .mov File Requested"; flow:established,to_server; uricontent: ".mov"; flowbits:set,BE.movuri; flowbits:noalert; classtype:not-suspicious; sid:2003206; rev:1;)