text
stringlengths
0
383k
WebAttackMSIEXMLDOMActiveXCVE-2013-73314 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a Information Disclosure vulnerability in Microsoft XMLDOM ActiveX. Additional Information Microsoft XMLDOM ActiveX control is prone to multiple information-disclosure vulnerabilities. Specifically, these issues affect unspecified methods that will allow website administrator to gain access to sensitive information through error codes. Note: Very limited information is currently available regarding this issue. We will update this BID as more information emerges. Attackers can exploit this issue by enticing an unsuspecting user to view a malicious webpage. Successful exploits will allow attackers to obtain sensitive information like local drive letters, files, and directory names; that may aid in further attacks. Affected Microsoft Windows 8.1 and earlier
WebAttackMSIEXMLDOMActiveXCVE-2013-73315 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a Information Disclosure vulnerability in Microsoft XMLDOM ActiveX. Additional Information Microsoft XMLDOM ActiveX control is prone to multiple information-disclosure vulnerabilities. Specifically, these issues affect unspecified methods that will allow website administrator to gain access to sensitive information through error codes. Note: Very limited information is currently available regarding this issue. We will update this BID as more information emerges. Attackers can exploit this issue by enticing an unsuspecting user to view a malicious webpage. Successful exploits will allow attackers to obtain sensitive information like local drive letters, files, and directory names; that may aid in further attacks. Affected Microsoft Windows 8.1 and earlier
Web Attack: MS IIS ASP Source Disclosure CVE-2000-0302 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description This signature detects attempts to exploit a vulnerability in IIS's handling of .asp extension files. Additional Information Index Server can be used to cause IIS to display the source of .asp and possibly other server-side processed files. By appending a space (%20) to the end of the filename specified in the 'CiWebHitsFile' variable, and setting 'CiHiliteType' to 'Full' and 'CiRestriction' to 'None', it is possible to retrieve the unprocessed source of the file. This is possible on any machine with Index Server installed, even those with no normal .htw files, because the virtual file null.htw is stored in memory and the .htw extension is mapped by default to webhits.dll. Affected Microsoft Index Server 2.0 Response Vendor updates have been released. For Microsoft Index Server 2.0: Microsoft Q252463
WebAttackMSIISFrontPage98ExtensionsBufferOverflowVulnerability Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description This signature detects HTTP requests to directly access the dvwssr.dll. Additional Information The dvwssr.dll, included with the Microsoft FrontPage 98 extensions for Microsoft Internet Information Services (IIS) and shipped as part of the Microsoft NT Option Pack, has a remotely exploitable buffer overflow. This attack will result in the service no longer accepting connections, and may allow for remote code execution on the vulnerable host. Affected Microsoft FrontPage 98 Server Extensions for IIS Microsoft InterDev 1.0 Response Workaround: Delete the DLL (this may break InterDev).
WebAttackMSInduSoftWebStudioDLLHijacking Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description InduSoft Web studio allows execution of arbitary code which may be delivered to user through remote WebDAV Shares. Additional Information InduSoft Web studio allows execution of REVERB1 if this DLL is located in the same folder than the .APP .The attacker must entice the user into opening the crafted .APP file. Affected Various Windows platforms Response NA
WebAttackMSInternetExplorerIEPeers.dllCVE-2010-0806 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects a remote code execution vulnerability in the Microsoft Internet Explorer. Additional Information Microsoft Internet Explorer is a browser for the Windows operating system. Internet Explorer is prone to a remote code-execution vulnerability. The issue occurs because an invalid pointer may attempt to access an object after it has been deleted. This may cause memory to become corrupted. This issue affects the 'iepeers.dll' library. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks may cause denial-of-service conditions. Affected Microsoft Internet Explorer 6.0, 7.0 Response Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
WebAttackMSInternetExplorerMemoryCorruptionCVE-2011-1345 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature will detect attempts to exploit a memory corruption vulnerability in Internet Explorer. Additional Information A defect in object lifetime management causes Internet Explorer to release an object twice which can lead to a delayed crash or even remote code execution. Affected Various
WebAttackMSInternetExplorerMemoryCorruptionCVE-2011-13452 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature will detect attempts to exploit a memory corruption vulnerability in Internet Explorer. Additional Information A defect in object lifetime management causes Internet Explorer to release an object twice which can lead to a delayed crash or even remote code execution. Affected Various
WebAttackMSInternetExplorerSameIDPropertyCVE-2012-1875 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer. Additional Information Microsoft Internet Explorer is a browser for the Windows operating system. Internet Explorer is prone to a remote code-execution vulnerability. Specifically, the problem occurs when accessing an object that has been deleted. Attackers can exploit this issue by enticing an unsuspecting user into opening a specially crafted webpage. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions. Affected Microsoft Internet Explorer 8
WebAttackMSJETDBBufferOverflowCAN-2005-0944 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description This signature detects an attempt to overflow a buffer in MSJET40.DLL by exploiting a parsing error when opening an MDB file. Additional Information It is reported that Microsoft Jet Database Engine is vulnerable to a buffer overflow vulnerability. This issue is due to a failure of the library to properly bounds check user-supplied database file contents. Attackers may exploit this vulnerability to execute arbitrary machine code in the context of the victim user attempting to access a malicious Jet database file. This vulnerability is reported to exist in the 'msjet40.dll' library, version 4.00.8618.0. Older versions may also be affected. The 'msjetole40.dll' OLE (Object Linking and Embedding) library is reportedly immune to this vulnerability. Affected Microsoft JET 2.0, 2.5, 3.0, 3.5, 3.51, 3.51 SP3, 4.0, 4.0 SP1, 4.0 SP2, 4.0 SP3, 4.0 SP4, 4.0 SP5, 4.0 SP6, 4.0 SP7 Response There are no known fixes for this issue. It is recommended that users upgrade to the latest version.
WebAttackMSMPEG2TuneRequestControlActiveXBOCVE-2008-0015 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an attempt to instantiate BDATuner.MPEG2TuneRequest ActiveX object. Creation of this object may result in remote code execution which could compromise the target host. Additional Information Microsoft TV Technologies is a component that provides support for digital TV applications. It is available for Windows XP. TV Technologies is prone to a remote code-execution vulnerability that affects the 'BDATuner.MPEG2TuneRequest.1' object and can be triggered when the object is instantiated with malformed input through the 'data' parameter. The object is associated with the following CLSID: 0955AC62-BF2E-4CBA-A2B9-A63F772D46CF An attacker could exploit this issue by enticing a victim to visit a maliciously crafted site. Successful exploits may allow an attacker to execute arbitrary code with the privileges of the user running the application. Affected Microsoft Windows XP Home SP2 Response Download and install all patches from the vendor related to this vulnerability.
WebAttackMSOfficeWordRTFRCE1 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature will detect attempts to exploit a remote code execution vulnerability in MS Word. Additional Information Microsoft Office is prone to a remote stack-based buffer-overflow vulnerability because the software fails to perform adequate boundary-checks on user-supplied data. This issue occurs when the application parses property strings from specially crafted RTF data. An attacker can exploit this issue by enticing an unsuspecting user to open a malicious RTF file or view an email in RTF format. Successfully exploiting this issue would allow the attacker to corrupt memory and execute arbitrary code in the context of the currently logged-in user. Failed exploit attempts will result in a denial-of-service condition. Affected Microsoft Office Response The vendor has released an advisory and updates. Please see the references for more information.
WebAttackMSPowerPointSoundDataRCE1 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects a vulnerability in Microsoft PowerPoint which may result in remote code execution. Additional Information Microsoft PowerPoint is prone to multiple remote code-execution vulnerabilities caused by an error in the 'Importer' feature when the application parses PowerPoint 95 files. Specifically, stack-based memory becomes corrupted when handling maliciously constructed sound data included in a '.ppt' file. These issues occur in the 'PP7X32.DLL' library and can be triggered with user-supplied data for either a record length value or a record name string. A successful exploit would allow an attacker to execute arbitrary code in the context of the currently logged-in user. Affected Microsoft PowerPoint Response The vendor has released an advisory and updates. Please see the references for details.
WebAttackMSPPTPServerBufferOverflow Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a buffer overflow vulnerability in the Microsoft PPTP server. Additional Information A buffer overflow vulnerability has been reported for Microsoft's PPTP (Point to Point Tunneling Protocol) implementation. The vulnerability reportedly exists in both the PPTP server and client applications. The PPTP service listens to traffic on TCP port 1723. Reportedly, it is possible to exploit the buffer overflow condition prior to authentication. A remote attacker who sends a specially crafted PPTP packet to a vulnerable system may be able to cause the application to corrupt kernel memory. It is also possible for an attacker to include malicious shell code and have it execute with the privileges of the PPTP process. This vulnerability has been reported for PPTP implementations in Microsoft Windows 2000 and Windows XP operating systems. Affected Avaya DefinityOne Media Servers Avaya IP600 Media Servers Avaya S3400 Message Application Server Avaya S8100 Media Servers Microsoft Windows 2000 Advanced Server SP1, SP2, SP3 Microsoft Windows 2000 Datacenter Server SP1, SP2, SP3 Microsoft Windows 2000 Professional SP1, SP2, SP3 Microsoft Windows 2000 Server SP1, SP2, SP3 Microsoft Windows 2000 Terminal Services SP1, SP2, SP3 Microsoft Windows XP 64-bit Edition SP1 Microsoft Windows XP Home SP1 Microsoft Windows XP Professional SP1 Response Workaround: A suggested workaround to prevent exploitation of the PPTP client is to restrict access to the client by blocking the TCP port 1723. Solution: Microsoft has released fixes. Microsoft Windows 2000 Advanced Server: Microsoft Patch Q329834 Microsoft Windows 2000 Advanced Server SP1: Microsoft Patch Q329834 Microsoft Windows 2000 Advanced Server SP2: Microsoft Patch Q329834 Microsoft Windows 2000 Advanced Server SP3: Microsoft Patch Q329834 Microsoft Windows 2000 Professional: Microsoft Patch Q329834 Microsoft Windows 2000 Professional SP1: Microsoft Patch Q329834 Microsoft Windows 2000 Professional SP2: Microsoft Patch Q329834 Microsoft Windows 2000 Professional SP3: Microsoft Patch Q329834 Microsoft Windows 2000 Server: Microsoft Patch Q329834 Microsoft Windows 2000 Server SP1: Microsoft Patch Q329834 Microsoft Windows 2000 Server SP2: Microsoft Patch Q329834 Microsoft Windows 2000 Server SP3: Microsoft Patch Q329834 Microsoft Windows 2000 Terminal Services: Microsoft Patch Q329834 Microsoft Windows 2000 Terminal Services SP1: Microsoft Patch Q329834 Microsoft Windows 2000 Terminal Services SP2: Microsoft Patch Q329834 Microsoft Windows 2000 Terminal Services SP3: Microsoft Patch Q329834 Microsoft Windows XP 64-bit Edition: Microsoft Patch Q329834 Microsoft Windows XP 64-bit Edition SP1: Microsoft Patch Q329834 Microsoft Windows XP Home: Microsoft Patch Q329834 Microsoft Windows XP Home SP1: Microsoft Patch Q329834 Microsoft Windows XP Professional: Microsoft Patch Q329834 Microsoft Windows XP Professional SP1: Microsoft Patch Q329834
WebAttackMSPPTViewerTextBytesAtomRCE Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects a vulnerability in Microsoft PowerPoint which may result in remote code execution. Additional Information Microsoft PowerPoint is a presentation application. PowerPoint Viewer lets users view presentations created in PowerPoint 97 and later versions. PowerPoint Viewer is prone to a remote code-execution vulnerability because it fails to properly perform boundary checks on user-supplied data. A stack-based buffer overflow can be triggered when PowerPoint Viewer opens a specially crafted file containing a malformed size argument in 'TextBytesAtom' record data. Successful exploits would allow an attacker to execute arbitrary code in the context of the currently logged-in user. NOTE: The standalone version of PowerPoint Viewer has reached its end of life. Updates are provided to support PowerPoint 2003 users who created presentations with certain features that rely on PowerPoint Viewer. Affected Microsoft PowerPoint Response The vendor has released an advisory and updates. Please see the references for details.
WebAttackMSPublisherTextBoxProcessingRCE Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects a vulnerability in Microsoft Publisher which may result in remote code execution. Additional Information Microsoft Publisher is a desktop publishing application available for Microsoft Windows. Publisher is prone to a buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied data. This issue occurs in the code responsible for converting files from the Publisher 97 format. Specifically, when parsing a Textbox item included in a Publisher 97 file, a buffer overflow may occur. An attacker can exploit this issue by enticing a victim to open a malicious Publisher file. Successful exploits would allow an attacker to execute arbitrary code in the context of the currently logged-in user. Affected Microsoft Publisher Response The vendor has released an advisory and updates. Please see the references for details.
WebAttackMSRatingsFileBufferOverflowCAN-2005-0555 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description This signature detects an attempt to exploit a buffer overflow vulnerability in the MS Rating file used by Internet Explorer. Additional Information A buffer overflow exists in the MSRATING.DLL, which is triggered when a malicious rsaci.rat file that contains a large name parameter is loaded. Affected Microsoft Internet Explorer 5.0.1, 5.0.1 SP1, 5.0.1 SP2, 5.0.1 SP3, 5.0.1 SP4, 5.5, 5.5 SP1, 5.5 SP2, 6.0, 6.0 SP1, 6.0 SP2 Response It is recommended that users consult Microsoft for patch information on this vulnerability.
WebAttackMSSilverlightCVE-2013-00742 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a Double Dereference vulnerability in Microsoft Silverlight which may result in remote code execution. Additional Information Microsoft Silverlight is a web application framework that provides support for .NET applications. Its security model limits the privileges granted to .NET applications. Silverlight is prone to a remote code-execution vulnerability due to a double dereference error. This may allow an attacker to access the memory in an unsafe manner using a specially crafted application. An attacker can exploit this issue to install programs, view, change, or delete data, or create new accounts with full user rights. Successful exploit may allow an attacker to execute arbitrary code with the privileges of the currently logged-in user. Failed exploit attempts will likely result in a denial-of-service condition. Affected Microsoft Silverlight
WebAttackMSSilverlightCVE-2013-00743 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a Double Dereference vulnerability in Microsoft Silverlight which may result in remote code execution. Additional Information Microsoft Silverlight is a web application framework that provides support for .NET applications. Its security model limits the privileges granted to .NET applications. Silverlight is prone to a remote code-execution vulnerability due to a double dereference error. This may allow an attacker to access the memory in an unsafe manner using a specially crafted application. An attacker can exploit this issue to install programs, view, change, or delete data, or create new accounts with full user rights. Successful exploit may allow an attacker to execute arbitrary code with the privileges of the currently logged-in user. Failed exploit attempts will likely result in a denial-of-service condition. Affected Microsoft Silverlight
WebAttackMSSilverlightCVE-2013-00744 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a Double Dereference vulnerability in Microsoft Silverlight which may result in remote code execution. Additional Information Microsoft Silverlight is a web application framework that provides support for .NET applications. Its security model limits the privileges granted to .NET applications. Silverlight is prone to a remote code-execution vulnerability due to a double dereference error. This may allow an attacker to access the memory in an unsafe manner using a specially crafted application. An attacker can exploit this issue to install programs, view, change, or delete data, or create new accounts with full user rights. Successful exploit may allow an attacker to execute arbitrary code with the privileges of the currently logged-in user. Failed exploit attempts will likely result in a denial-of-service condition. Affected Microsoft Silverlight
WebAttackMSSilverlightCVE-2013-00745 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a Double Dereference vulnerability in Microsoft Silverlight which may result in remote code execution. Additional Information Microsoft Silverlight is a web application framework that provides support for .NET applications. Its security model limits the privileges granted to .NET applications. Silverlight is prone to a remote code-execution vulnerability due to a double dereference error. This may allow an attacker to access the memory in an unsafe manner using a specially crafted application. An attacker can exploit this issue to install programs, view, change, or delete data, or create new accounts with full user rights. Successful exploit may allow an attacker to execute arbitrary code with the privileges of the currently logged-in user. Failed exploit attempts will likely result in a denial-of-service condition. Affected Microsoft Silverlight
WebAttackMSSilverlightCVE-2013-00746 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a Double Dereference vulnerability in Microsoft Silverlight which may result in remote code execution. Additional Information Microsoft Silverlight is a web application framework that provides support for .NET applications. Its security model limits the privileges granted to .NET applications. Silverlight is prone to a remote code-execution vulnerability due to a double dereference error. This may allow an attacker to access the memory in an unsafe manner using a specially crafted application. An attacker can exploit this issue to install programs, view, change, or delete data, or create new accounts with full user rights. Successful exploit may allow an attacker to execute arbitrary code with the privileges of the currently logged-in user. Failed exploit attempts will likely result in a denial-of-service condition. Affected Microsoft Silverlight
WebAttackMSSilverlightCVE-2016-0034 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a Double Dereference vulnerability in Microsoft Silverlight which may result in remote code execution. Additional Information Microsoft Silverlight is a web application framework that provides support for .NET applications. Its security model limits the privileges granted to .NET applications. Silverlight is prone to a remote code-execution vulnerability due to a double deference error. This may allow an attacker to access the memory in an unsafe manner using a specially crafted application. An attacker can exploit this issue to install programs, view, change, or delete data, or create new accounts with full user rights. Successful exploit may allow an attacker to execute arbitrary code with the privileges of the currently logged-in user. Failed exploit attempts will likely result in a denial-of-service condition. Affected Microsoft Silverlight Response Updates are available. Please see the references or vendor advisory for more information.
WebAttackMSSilverlightCVE-2016-00342 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a Double Dereference vulnerability in Microsoft Silverlight which may result in remote code execution. Additional Information Microsoft Silverlight is a web application framework that provides support for .NET applications. Its security model limits the privileges granted to .NET applications. Silverlight is prone to a remote code-execution vulnerability due to a double deference error. This may allow an attacker to access the memory in an unsafe manner using a specially crafted application. An attacker can exploit this issue to install programs, view, change, or delete data, or create new accounts with full user rights. Successful exploit may allow an attacker to execute arbitrary code with the privileges of the currently logged-in user. Failed exploit attempts will likely result in a denial-of-service condition. Affected Microsoft Silverlight Response Updates are available. Please see the references or vendor advisory for more information.
WebAttackMSSpeechCOMObjectMemoryCorruptionVulnerability Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a vulnerability in the Microsoft Speech API 4 which could result in remote code execution. Additional Information Microsoft Internet Explorer is prone to multiple buffer-overflow vulnerabilities when instantiating certain COM objects. An attacker may exploit these issues by enticing victims into opening a maliciously crafted webpage. The vulnerability resides in the ActiveListen and ActiveVoice speech controls of the Speech API 4. The following COM object CLSIDs and corresponding DLLs are affected: - {4E3D9D1F-0C63-11D1-8BFB-0060081841DE}, Xlisten.dll - {EEE78591-FE22-11D0-8BEF-0060081841DE}, Xvoice.dll Successfully exploiting these issues allows remote attackers to execute arbitrary machine code in the context of the affected application, facilitating the remote compromise of affected computers. Affected Internet Explorer 5.01 Internet Explorer 6 Service Pack 1 Internet Explorer 6 Internet Explorer 7 Response Download all applicable patches from the vendor and ensure that all patches are applied.
WebAttackMSSQLLongRequestHelloBO Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description This signature detects an attempt to exploit a vulnerability in MS SQL. Additional Information A vulnerability has been discovered in Microsoft SQL Server that could make it possible for remote attackers to gain access to target hosts. It is possible for an attacker to cause a buffer overflow condition on the vulnerable SQL server with a malformed login request. This vulnerability reportedly occurs even before authentication can proceed. Microsoft SQL Server listens for connections on TCP port 1433. An attacker can exploit this vulnerability by sending specially crafted packets to TCP port 1433 which causes SQL Server to crash and possibly execute attacker supplied code. It is possible that this issue may be remotely exploitable to execute arbitrary code as the SQL Server process. This vulnerability was reported in BugTraq ID 5868, Multiple Microsoft SQL Server Vulnerabilities. Affected Microsoft Data Engine 2000 Microsoft SQL Server 2000 SP1, SP2 Response Microsoft has revised their advisory. Microsoft recommends that users of SQL 2000 and MSDE 2000 apply the patch from MS02-061 which contains additional security fixes: Microsoft SQL Server 2000: Microsoft Patch Q280380 Microsoft Patch Q299717 Microsoft Patch Q298012 Microsoft Upgrade sql2ksp2 Microsoft Hotfix KillPwd.exe Microsoft Service Pack sql2ksp3 Microsoft Data Engine 2000: Microsoft Patch Q323875_SQL2000_SP2_en Microsoft SQL Server 2000 SP1: Microsoft Patch Q299717 Microsoft Patch Q298012 Microsoft Hotfix s80428i Microsoft Upgrade sql2ksp2 Microsoft Service Pack sql2ksp3 Microsoft SQL Server 2000 SP2: Microsoft Patch Q316333 Microsoft Patch Q316333 Microsoft Patch SQLXML2_Q321460 Microsoft Patch Q321858_SQL_Security_MDAC26 Microsoft Patch Q321858_SQL_Security_MDAC27 Microsoft Patch SQLXML3_Q320833 Microsoft Patch Q316333 Microsoft Patch Q316333 Microsoft Patch Q316333 Microsoft Patch Q323875_SQL2000_SP2_en Microsoft Patch Q316333 Microsoft Patch Q316333 Microsoft Patch Q316333 Microsoft Service Pack sql2ksp3 Microsoft Patch Q316333
WebAttackMSSQLPacketResolutionDoS Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description This signature detects an attempt to exploit a denial of service vulnerability in MS SQL. Additional Information A vulnerability has been discovered in Microsoft SQL Server 2000 that could make it possible for remote attackers to gain access to target hosts. A problem in the SQL Server Resolution Service makes it possible for a remote user to execute arbitrary code on a vulnerable host. An attacker could exploit a heap-based overflow in the resolution service by sending a maliciously crafted UDP packet to port 1434. UDP port 1434 is designated as the Microsoft SQL Monitor port. Clients connect to this port to discover how connections to SQL Server should be made. When SQL Server receives a packet that starts with byte 0x08 followed by an overly long string and ending with a ':' and terminated by a number, the heap overflow is triggered. This causes key memory structures necessary for normal operations to be corrupted. If the packet consists of data not specifically designed to cause code execution, a denial of service may result. It may be possible to custom-craft the exploit code to execute arbitrary instructions in the security context of the SQL Server. This may provide a remote attacker with local access on the underlying host. ***UPDATE: On January 25 2003, DeepSight TMS detected a significant increase in UDP traffic destined for port 1434. Port 1434 is associated with Microsoft SQL Server. Initial analysis has suggested the presence of a new worm that is propagating rapidly through hosts running SQL Server. The worm can use significant amounts of bandwidth. It was originally suspected that this was due to a denial of service attack built into the worm. It has turned out that this is not the case -- the bandwidth consumption is due to aggressive propagation. At this time it is suspected that the worm may exploit BID 5310 or 5311. This is not yet confirmed. Administrators are advised to block all external access to database servers until more information is available. Access to TCP and UDP ports 1434 should be denied completely. Additionally, implementing filter rules for other ports may also decrease the chances of compromise through yet unknown avenues. This should be done even if the patch for this particular vulnerability has been installed. Cisco has released an advisory that details workaround information. Microsoft recommends that affected users apply SQL Server 2000 Service Pack 3. Affected Microsoft Data Engine 2000 Microsoft SQL Server 2000 SP1, SP2 Veritas Software Backup Exec for Windows Servers 9.0 Response Prior to installing the fixes, administrators are advised to ensure that all SQL Server processes are inactive. Ensure that all installations of SQL server are patched and reboot the system before restarting the SQL server. Veritas Software Backup Exec 9.0 ships with some MSDE components and may therefore be prone to this vulnerability. Users are advised to apply the Microsoft fixes to address this vulnerability for Backup Exec. A specific fix has been released for the Microsoft .NET Framework SDK. See the References section for a link to Microsoft Knowledge Base article 813850 for instructions and download information. Fixes available: Microsoft SQL Server 2000: Microsoft Patch Q280380 Microsoft Patch Q299717 Microsoft Patch Q298012 Microsoft Upgrade sql2ksp2 Microsoft Hotfix KillPwd.exe Microsoft Service Pack sql2ksp3 Microsoft Data Engine 2000: Microsoft Patch Q323875_SQL2000_SP2_en Microsoft SQL Server 2000 SP1: Microsoft Patch Q299717 Microsoft Patch Q298012 Microsoft Hotfix s80428i Microsoft Upgrade sql2ksp2 Microsoft Service Pack sql2ksp3 Microsoft SQL Server 2000 SP2: Microsoft Patch Q316333 Microsoft Patch Q316333 Microsoft Patch SQLXML2_Q321460 Microsoft Patch Q321858_SQL_Security_MDAC26 Microsoft Patch Q321858_SQL_Security_MDAC27 Microsoft Patch SQLXML3_Q320833 Microsoft Patch Q316333 Microsoft Patch Q316333 Microsoft Patch Q316333 Microsoft Patch Q323875_SQL2000_SP2_en Microsoft Patch Q316333 Microsoft Patch Q316333 Microsoft Patch Q316333 Microsoft Service Pack sql2ksp3 Microsoft Patch Q316333
WebAttackMSSQLServerCVE-2012-2552 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects a Cross Site Scripting attack on SQL Server Reporting services. Additional Information Cross Site Scripting attacks on SQL Server reporting services can result in embedding of script tags in URLs and enticing unsuspecting users to click on them, ensuring that the malicious Javascript gets executed on the victim's machine. Affected SQL Server
WebAttackMSTDCCTLControlActiveX Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature will detect attempts to exploit a buffer overflow vulnerability in IE Tabular ActiveX Control. Additional Information There is a vulnerability in the IE tabular control in a way that IE handles certain DOM operations that could lead to crash or remote code execution. Affected IE 6.0
WebAttackMSTrueTypeFontCVE-2012-2897 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Microsoft TrueType Font parsing engine. Additional Information A vulnerability exists in Microsoft Win32k TrueType Font parsing engine that can lead to execution of arbitrary code on the machine. Affected Various Windows Platforms.
Web Attack: MS Visual Studio RAD Support Buffer Overflow CVE-2001-0341 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit the Microsft Visual Studio RAD Support Buffer Overflow vulnerability. Additional Information FrontPage Server Extensions (FPSE) ships with Microsoft Office 2000 and Office XP. FPSE are components that run on IIS servers and are used for the development of Web sites via FrontPage and Visual InterDev. Visual InterDev is a member of the Visual Studio Web development tools, and is used to design Web applications that bring together Web content, database resources, and various programs. A subcomponent of FPSE, called Visual InterDev RAD Remote Deployment Support, enables the Visual InterDev developer to easily register COM objects on a Web server. Due to an unchecked buffer in 'fp30reg.dll' of Visual InterDev RAD Remote Deployment Support, a user could execute arbitrary commands on a target host. If the host is running IIS 5.0, the commands could be executed in the context of IWAM_machinename. A host running IIS 4.0 could allow the execution of arbitrary commands in the SYSTEM context. The problem lies in the section of code that specifically processes COM object register requests (fp30reg.dll). If a specially crafted request composed of 258 bytes is sent to a server with RAD Remote Deployment Support installed, the buffer could overrun and allow the execution of arbitrary code. Note that Visual Studio RAD Deployment Support must be manually installed and configured by a user. It is not installed by default. Successful exploitation of this vulnerability could lead to a complete compromise of the host. Affected Microsoft Windows 2000 Advanced Server SP1, SP2 Microsoft Windows 2000 Datacenter Server SP1, SP2 Microsoft Windows 2000 Professional SP1, SP2 Microsoft Windows 2000 Server SP1, SP2 Microsoft Windows 2000 Terminal Services SP1, SP2 Microsoft Windows NT Enterprise Server 4.0, 4.0 SP1, 4.0 SP2, 4.0 SP3, 4.0 SP4, 4.0 SP5, 4.0 SP6, 4.0 SP6a Microsoft Windows NT Server 4.0, 4.0 SP1, 4.0 SP2, 4.0 SP3, 4.0 SP4, 4.0 SP5, 4.0 SP6, 4.0 SP6a Microsoft Windows NT Terminal Server 4.0, 4.0 SP1, 4.0 SP2, 4.0 SP3, 4.0 SP4, 4.0 SP5, 4.0 SP6 Microsoft Windows NT Workstation 4.0, 4.0 SP1, 4.0 SP2, 4.0 SP3, 4.0 SP4, 4.0 SP5, 4.0 SP6, 4.0 SP6a
WebAttackMSWindowsExplorerCodeExecutionVulnerability Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a code execution vulnerability in Windows Explorer when opening a malformed search file. Additional Information A remote code execution vulnerability exists when saving a specially crafted search file within Windows Explorer. This operation causes Windows Explorer to exit and restart in an exploitable manner. To view this vulnerability as a standard entry in the Common Vulnerabilities and Exposures list, see CVE-2008-1435. Affected Windows Vista Windows Vista SP1 Windows Vista x64 Edition Windows Vista x64 Edition SP1 Windows Server 2008 Response Download and install all vendor patched related to this vulnerability.
WebAttackMSWindowsMSHTAShellExecution Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an OLE Compound File Format Document with an embedded MSHTA CLSID. Additional Information Microsoft Windows is prone to a vulnerability that may allow remote attackers to execute code through the Windows Shell. The cause of the vulnerability is related to how the operating system handles unregistered file types. The specific issue is that files with an unknown extension may be opened with the application specified in the embedded CLSID. Microsoft has reported that, as a result, it may be possible to force the Windows Shell to execute the HTML Application Host. The victim would be required to open a malicious file, possibly hosted on a Web site or sent through email. The nature of the vulnerability would require the attacker to trick the user into thinking the file is of a trusted type, such as obfuscating the file extension so that the victim may think it is a Word document when it is in fact an unregistered file type. Successful exploitation will result in execution of arbitrary code in the context of the victim user. It has been demonstrated that the issue can be exploited through malicious '.hta' content disguised as a Word document. Other unregistered file extensions may also present the issue. This vulnerability may bypass a security feature of Windows XP SP2 that would warn users when they are about to execute unsigned content originating from a remote source. Affected Microsoft Windows 2000 Advanced Server SP1, SP2, SP3, SP4 Microsoft Windows 2000 Datacenter Server SP1, SP2, SP3, SP4 Microsoft Windows 2000 Professional SP1, SP2, SP3, SP4 Microsoft Windows 2000 Server SP1, SP2, SP3, SP4 Microsoft Windows 98 Microsoft Windows 98SE Microsoft Windows ME Microsoft Windows Server 2003 Datacenter Edition Microsoft Windows Server 2003 Enterprise Edition Microsoft Windows Server 2003 Standard Edition Microsoft Windows Server 2003 Web Edition Microsoft Windows XP 64-bit Edition SP1 Microsoft Windows XP 64-bit Edition Version 2003 SP1 Microsoft Windows XP Home SP1, SP2 Microsoft Windows XP Media Center Edition SP1, SP2 Microsoft Windows XP Professional SP1, SP2 Microsoft Windows XP Tablet PC Edition SP1, SP2 Response Workaround: It may be possible to mitigate attacks that abuse the HTML Application Host by disabling it. This will not eliminate the vulnerability, but it may limit exposure to a known attack vector. Further information may be found in the attached Microsoft advisory. Solution: Microsoft has released fixes to address this vulnerability on supported platforms. Microsoft Windows 2000 Advanced Server SP3: Microsoft Patch Security Update for Windows 2000 (KB893086) Microsoft Windows 2000 Advanced Server SP4: Microsoft Patch Security Update for Windows 2000 (KB893086) Microsoft Windows 2000 Datacenter Server SP3: Microsoft Patch Security Update for Windows 2000 (KB893086) Microsoft Windows 2000 Datacenter Server SP4: Microsoft Patch Security Update for Windows 2000 (KB893086) Microsoft Windows 2000 Professional SP3: Microsoft Patch Security Update for Windows 2000 (KB893086) Microsoft Windows 2000 Professional SP4: Microsoft Patch Security Update for Windows 2000 (KB893086) Microsoft Windows Server 2003 Enterprise Edition: Microsoft Patch Security Update for Windows Server 2003 (KB893086) Microsoft Windows Server 2003 Standard Edition: Microsoft Patch Security Update for Windows Server 2003 (KB893086) Microsoft Windows Server 2003 Web Edition: Microsoft Patch Security Update for Windows Server 2003 (KB893086) Microsoft Windows XP 64-bit Edition SP1: Microsoft Patch Security Update for Windows XP 64-bit Edition (KB893086) Microsoft Windows XP Home SP1: Microsoft Patch Security Update for Windows XP (KB893086) Microsoft Windows XP Home SP2: Microsoft Patch Security Update for Windows XP (KB893086) Microsoft Windows XP Media Center Edition SP1: Microsoft Patch Security Update for Windows XP (KB893086) Microsoft Windows XP Media Center Edition SP2: Microsoft Patch Security Update for Windows XP (KB893086) Microsoft Windows XP Professional SP1: Microsoft Patch Security Update for Windows XP (KB893086) Microsoft Windows XP Professional SP2: Microsoft Patch Security Update for Windows XP (KB893086) Microsoft Windows XP Tablet PC Edition SP1: Microsoft Patch Security Update for Windows XP (KB893086) Microsoft Windows XP Tablet PC Edition SP2: Microsoft Patch Security Update for Windows XP (KB893086)
WebAttackMSWindowsOTFCVE-2015-2426 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Windows OpenType Font Driver. Additional Information Microsoft Windows is prone to a remote code-execution vulnerability. Specifically, this issue occurs when the Windows Adobe Type Manager Library fails to properly handle specially-crafted OpenType fonts. Successful exploits allow attackers to execute arbitrary code in the context of the vulnerable application. Failed exploit attempts will result in a denial-of-service condition. Affected Microsoft Windows Vista Service Pack 2 0 Microsoft Windows Server 2008 R2 for x64-based Systems SP1 Microsoft Windows Server 2008 for x64-based Systems SP2 Microsoft Windows Server 2008 for Itanium-based Systems SP2 Microsoft Windows Server 2008 for 32-bit Systems SP2 Microsoft Windows 7 for x64-based Systems SP1 Microsoft Windows 7 for 32-bit Systems SP1
WebAttackMSWMIToolCVE-2010-3973 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to arbitrary code execution in activex WBEMSingleView.ocx of WMI Administrative Tools. Additional Information WMI Administrative Tools is prone to a vulnerability that lets attackers execute arbitrary code.WBEMSingleView.ocx has a method AddContextRef,which could directly call the address give as parameters. Successfully exploiting these issues will allow attackers to execute arbitrary within the context of the application (typically Internet Explorer) that uses the ActiveX control. Affected IE
WebAttackMSWordembedMaliciousFlash2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an unspecified vulnerability in a MS Word document which will result in dropping a backdoor on the exploited machine. Additional Information A remote code execution vulnerability exists in the way that Office handles specially crafted MS Word document files (.doc). The vulnerability could allow remote code execution if a user opens a specially crafted .doc file and will result in being infected with a backdoor. An attacker who successfully exploited this vulnerability could take control of an affected system with this backdoor. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Affected Microsoft Word 2002 Service Pack 3 Response Download and install all vendor patches related to this vulnerability.
WebAttackMSWordembedSuspiciousFlash Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an unspecified vulnerability in a MS Word document which will result in dropping a backdoor on the exploited machine. Additional Information A remote code execution vulnerability exists in the way that Office handles specially crafted MS Word document files (.doc). The vulnerability could allow remote code execution if a user opens a specially crafted .doc file and will result in being infected with a backdoor. An attacker who successfully exploited this vulnerability could take control of an affected system with this backdoor. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Affected Microsoft Word 2002 Service Pack 3 Response Download and install all vendor patches related to this vulnerability.
Web Attack: Muieblackcat Scanner Request Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Muieblackcat scanner activity. Additional Information Muieblackcat scanner can be used in gathering sensitive information from the remote server. Affected Various Platforms. Response
WebAttackMusicAnimationMachineMIDIPlayerBO Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an attempt to exploit a stack based buffer overflow vulnerability in Music Animation Machine MIDI Player which could result in remote code execution or cause a denial-of-service. Additional Information Music Animation Machine MIDI Player is a multimedia player. The application is prone to a remote stack-based buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input. Specifically, this issue occurs when parsing a specially crafted 'MAMX' file. Successfully exploiting this issue may allow remote attackers to execute arbitrary code in the context of the vulnerable application. Failed attacks will cause denial-of-service conditions. Affected Music Animation Machine MIDI Player 2006aug19 Release 035 is vulnerable; other versions may also be affected.
WebAttackMVPowerDVRShellUnauthenticatedCommandExecution Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts by metasploit to upload files into vulnerable applications and servers. Additional Information There exists an file upload vulnerablity in several applications that could result to remote code execution. Affected Multipile
WebAttackMyBBAdminControlCVE-2022-24734 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit Remote Code Injection vulnerability on the affected machine. Additional Information MyBB Admin Control is vulnerable to Remote Code Injection attack. Successfully exploiting these issues will allow attackers to execute arbitrary code within the context of the application. Affected MyBB prior to version 1.8.30 Response
WebattackMynewsgroups Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description MyNewsGroups is a web-based news reader implemented in PHP. Additional Information MyNewsGroups is a web-based news reader implemented in PHP. MyNewsGroups is prone to a remote file-include vulnerability because it fails to properly sanitize user-supplied input to the 'myng_root' parameter of the 'layersmenu.inc.php' script. An attacker can exploit this issue to include an arbitrary remote file containing malicious PHP code and execute it in the context of the webserver process. This may allow the attacker to compromise the application and to gain access to the underlying system. This issue affects version 0.6b; other versions may also be vulnerable. Affected MyNewsGroups MyNewsGroups 0.6b Response Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected]:[email protected].
Web Attack: MySQL Suspicious Function Create Request Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to create custom functions on MySQL server. Additional Information Malicious plugins can be uploaded and imported into MySQL DB that can be utilized to create custom function and download malwares on to the system. Affected MySQL Database Servers. Response
Web Attack: Mythic Tool Payload Activity Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Mythic network activity on the affected machine. Additional Information Mythic is a cross-platform, post-exploit, red teaming framework built with python3, docker, docker-compose, and a web browser UI. It's designed to provide a collaborative and user friendly interface for operators, managers, and reporting throughout red teaming. Affected Various operating systems Response
Web Attack: Mythic Tool Payload Download Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Mythic network activity on the affected machine. Additional Information Mythic is a cross-platform, post-exploit, red teaming framework built with python3, docker, docker-compose, and a web browser UI. It's designed to provide a collaborative and user friendly interface for operators, managers, and reporting throughout red teaming. Affected Various operating systems Response
WebAttackNagiosAuthenticatedRCE Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a vulnerability in Nagios XI. Additional Information Nagios is a Log Management Software. A vulnerability exists in Nagios XI before 5.6.6 which allows execution of arbitrary commands as root. A single authentication is required for exploitation. Affected Nagios XI before 5.6.6 Response Upgrading to latest version eliminates the vulnerability.
WebAttackNagiosXICommandInjectionCVE-2018-15708 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit Command Injection vulnerability on the affected machine. Additional Information Nagios XI is an IT infrastructure monitoring system. Nagios XI is prone to a command-injection vulnerability that exists in the 'MagpieRSS library'. Specifically, this issue affects the HTTP GET 'url' parameter within the 'magpie_debug.php' script. An attacker can exploit this issue to inject arbitrary arguments into the curl command and write arbitrary data to a location within the privileges of the Apache user. Successfully exploiting this issue may allow an attacker to execute arbitrary commands in the context of the affected application. Affected Nagios XI 5.5.6 is vulnerable; other versions may also be affected. Response Updates are available. Please see the references or vendor advisory for more information.
Web Attack: Nagios Xi Cross Site Scripting Vulnerability CVE-2021-25299 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit Cross Site Scripting vulnerability on the affected machine. Additional Information Nagios XI version xi-5.7.5 is affected by cross-site scripting (XSS). The vulnerability exists in the file /usr/local/nagiosxi/html/admin/sshterm.php due to improper sanitization of user-controlled input. A maliciously crafted URL, when clicked by an admin user, can be used to steal his/her session cookies or it can be chained with the previous bugs to get one-click remote command execution (RCE) on the Nagios XI server. Affected Nagios XI version xi-5.7.5 Response
WebAttackNebulaExploitKitWebsite Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackNebulaPayloadDownload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackNeosploitToolkitFileDownload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an attempt to download malicious files related to Trojan.Mebroot which may compromise the target host. Additional Information Trojan.Mebroot is a Trojan horse that overwrites the Master Boot Record of the hard disk and uses rootkit techniques to hide itself. It has been reported that this threat may be installed from the following location using browser exploits: [http://]gfeptwe.com[REMOVED] When the Trojan is executed, it creates the following mutex so that only one instance of it is running on the compromised computer at any time: Global\7BC8413E-DEF5-4BF6-9530-9EAD7F45338B It then reads the Master Boot Record (MBR) and then scans the partition table to find the active boot partition of the computer. The Trojan infects the MBR, copying the original MBR to sector 62 on the hard disk. It then installs its own kernel loader to sectors 60 and 61 of the hard disk. Next, it copies a rootkit driver near the end of the active boot partition. The Trojan overwrites around 1149 sectors (467 KB) when copying the driver. Next, the Trojan creates a .dll file in the current folder where it is executed and then runs the following command: regsvr32 /s [TROJAN FILE NAME].dll Note: It has been reported that the file name could be mat[RANDOM NUMBER].dll. It may then restart the compromised computer or display the following message: Some updates require you to restart your computer to complete the update process. Be sure to save any work prior to the scheduled time. When the computer restarts, the infected MBR will start the kernel loader located in sectors 60 and 61, which patches the Windows Kernel in memory to load the rootkit driver. The rootkit driver then hooks the following kernel routines: * IRP_MJ_READ * IRP_MJ_WRITE If sector 0 is read from hard disk, the Trojan will return the original MBR backup stored at sector 62. It will also try to block writing to sector 0, in order to prevent removal. The Trojan also opens a back door, which attempts to bypass the local firewall and connect to the following location,allowing an attacker to control the compromised computer: [http://]dkfhchkb.com/ser[REMOVED] The Trojan may also inject additional code into usermode processes. Affected Windows 2000, Windows Server 2003, Windows Vista, Windows XP Response 1. Restart the computer using the Windows Recovery Console. 2. Disable System Restore (Windows Me/XP). 3. Update the virus definitions. 4. Run a full system scan.
WebAttackNeosploitToolkitJARDownload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an attempt to download malicious files related to Trojan.Mebroot which may compromise the target host. Additional Information Trojan.Mebroot is a Trojan horse that overwrites the Master Boot Record of the hard disk and uses rootkit techniques to hide itself. It has been reported that this threat may be installed from the following location using browser exploits: [http://]gfeptwe.com[REMOVED] When the Trojan is executed, it creates the following mutex so that only one instance of it is running on the compromised computer at any time: Global\7BC8413E-DEF5-4BF6-9530-9EAD7F45338B It then reads the Master Boot Record (MBR) and then scans the partition table to find the active boot partition of the computer. The Trojan infects the MBR, copying the original MBR to sector 62 on the hard disk. It then installs its own kernel loader to sectors 60 and 61 of the hard disk. Next, it copies a rootkit driver near the end of the active boot partition. The Trojan overwrites around 1149 sectors (467 KB) when copying the driver. Next, the Trojan creates a .dll file in the current folder where it is executed and then runs the following command: regsvr32 /s [TROJAN FILE NAME].dll Note: It has been reported that the file name could be mat[RANDOM NUMBER].dll. It may then restart the compromised computer or display the following message: Some updates require you to restart your computer to complete the update process. Be sure to save any work prior to the scheduled time. When the computer restarts, the infected MBR will start the kernel loader located in sectors 60 and 61, which patches the Windows Kernel in memory to load the rootkit driver. The rootkit driver then hooks the following kernel routines: * IRP_MJ_READ * IRP_MJ_WRITE If sector 0 is read from hard disk, the Trojan will return the original MBR backup stored at sector 62. It will also try to block writing to sector 0, in order to prevent removal. The Trojan also opens a back door, which attempts to bypass the local firewall and connect to the following location,allowing an attacker to control the compromised computer: [http://]dkfhchkb.com/ser[REMOVED] The Trojan may also inject additional code into usermode processes. Affected Windows 2000, Windows Server 2003, Windows Vista, Windows XP Response 1. Restart the computer using the Windows Recovery Console. 2. Disable System Restore (Windows Me/XP). 3. Update the virus definitions. 4. Run a full system scan.
WebAttackNeosploitToolkitPDFDownload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an attempt to download malicious files related to Trojan.Mebroot which may compromise the target host. Additional Information Trojan.Mebroot is a Trojan horse that overwrites the Master Boot Record of the hard disk and uses rootkit techniques to hide itself. It has been reported that this threat may be installed from the following location using browser exploits: [http://]gfeptwe.com[REMOVED] When the Trojan is executed, it creates the following mutex so that only one instance of it is running on the compromised computer at any time: Global\7BC8413E-DEF5-4BF6-9530-9EAD7F45338B It then reads the Master Boot Record (MBR) and then scans the partition table to find the active boot partition of the computer. The Trojan infects the MBR, copying the original MBR to sector 62 on the hard disk. It then installs its own kernel loader to sectors 60 and 61 of the hard disk. Next, it copies a rootkit driver near the end of the active boot partition. The Trojan overwrites around 1149 sectors (467 KB) when copying the driver. Next, the Trojan creates a .dll file in the current folder where it is executed and then runs the following command: regsvr32 /s [TROJAN FILE NAME].dll Note: It has been reported that the file name could be mat[RANDOM NUMBER].dll. It may then restart the compromised computer or display the following message: Some updates require you to restart your computer to complete the update process. Be sure to save any work prior to the scheduled time. When the computer restarts, the infected MBR will start the kernel loader located in sectors 60 and 61, which patches the Windows Kernel in memory to load the rootkit driver. The rootkit driver then hooks the following kernel routines: * IRP_MJ_READ * IRP_MJ_WRITE If sector 0 is read from hard disk, the Trojan will return the original MBR backup stored at sector 62. It will also try to block writing to sector 0, in order to prevent removal. The Trojan also opens a back door, which attempts to bypass the local firewall and connect to the following location,allowing an attacker to control the compromised computer: [http://]dkfhchkb.com/ser[REMOVED] The Trojan may also inject additional code into usermode processes. Affected Windows 2000, Windows Server 2003, Windows Vista, Windows XP Response 1. Restart the computer using the Windows Recovery Console. 2. Disable System Restore (Windows Me/XP). 3. Update the virus definitions. 4. Run a full system scan.
WebAttackNeosploitToolkitRedirect Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempt to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Affected Various Response Update all vendor patches to the latest versions.
WebAttackNeosploitToolkitWebsite3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an attempt to download malicious files related to Trojan.Mebroot which may compromise the target host. Additional Information Trojan.Mebroot is a Trojan horse that overwrites the Master Boot Record of the hard disk and uses rootkit techniques to hide itself. It has been reported that this threat may be installed from the following location using browser exploits: [http://]gfeptwe.com[REMOVED] When the Trojan is executed, it creates the following mutex so that only one instance of it is running on the compromised computer at any time: Global\7BC8413E-DEF5-4BF6-9530-9EAD7F45338B It then reads the Master Boot Record (MBR) and then scans the partition table to find the active boot partition of the computer. The Trojan infects the MBR, copying the original MBR to sector 62 on the hard disk. It then installs its own kernel loader to sectors 60 and 61 of the hard disk. Next, it copies a rootkit driver near the end of the active boot partition. The Trojan overwrites around 1149 sectors (467 KB) when copying the driver. Next, the Trojan creates a .dll file in the current folder where it is executed and then runs the following command: regsvr32 /s [TROJAN FILE NAME].dll Note: It has been reported that the file name could be mat[RANDOM NUMBER].dll. It may then restart the compromised computer or display the following message: Some updates require you to restart your computer to complete the update process. Be sure to save any work prior to the scheduled time. When the computer restarts, the infected MBR will start the kernel loader located in sectors 60 and 61, which patches the Windows Kernel in memory to load the rootkit driver. The rootkit driver then hooks the following kernel routines: * IRP_MJ_READ * IRP_MJ_WRITE If sector 0 is read from hard disk, the Trojan will return the original MBR backup stored at sector 62. It will also try to block writing to sector 0, in order to prevent removal. The Trojan also opens a back door, which attempts to bypass the local firewall and connect to the following location,allowing an attacker to control the compromised computer: [http://]dkfhchkb.com/ser[REMOVED] The Trojan may also inject additional code into usermode processes. Affected Windows 2000, Windows Server 2003, Windows Vista, Windows XP Response 1. Restart the computer using the Windows Recovery Console. 2. Disable System Restore (Windows Me/XP). 3. Update the virus definitions. 4. Run a full system scan.
WebAttackNeosploitToolkitWebsite4 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an attempt to download malicious files related to Trojan.Mebroot which may compromise the target host. Additional Information Trojan.Mebroot is a Trojan horse that overwrites the Master Boot Record of the hard disk and uses rootkit techniques to hide itself. It has been reported that this threat may be installed from the following location using browser exploits: [http://]gfeptwe.com[REMOVED] When the Trojan is executed, it creates the following mutex so that only one instance of it is running on the compromised computer at any time: Global\7BC8413E-DEF5-4BF6-9530-9EAD7F45338B It then reads the Master Boot Record (MBR) and then scans the partition table to find the active boot partition of the computer. The Trojan infects the MBR, copying the original MBR to sector 62 on the hard disk. It then installs its own kernel loader to sectors 60 and 61 of the hard disk. Next, it copies a rootkit driver near the end of the active boot partition. The Trojan overwrites around 1149 sectors (467 KB) when copying the driver. Next, the Trojan creates a .dll file in the current folder where it is executed and then runs the following command: regsvr32 /s [TROJAN FILE NAME].dll Note: It has been reported that the file name could be mat[RANDOM NUMBER].dll. It may then restart the compromised computer or display the following message: Some updates require you to restart your computer to complete the update process. Be sure to save any work prior to the scheduled time. When the computer restarts, the infected MBR will start the kernel loader located in sectors 60 and 61, which patches the Windows Kernel in memory to load the rootkit driver. The rootkit driver then hooks the following kernel routines: * IRP_MJ_READ * IRP_MJ_WRITE If sector 0 is read from hard disk, the Trojan will return the original MBR backup stored at sector 62. It will also try to block writing to sector 0, in order to prevent removal. The Trojan also opens a back door, which attempts to bypass the local firewall and connect to the following location,allowing an attacker to control the compromised computer: [http://]dkfhchkb.com/ser[REMOVED] The Trojan may also inject additional code into usermode processes. Affected Windows 2000, Windows Server 2003, Windows Vista, Windows XP Response 1. Restart the computer using the Windows Recovery Console. 2. Disable System Restore (Windows Me/XP). 3. Update the virus definitions. 4. Run a full system scan.
WebAttackNeosploitToolkitWebsite5 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description NeoSploit is a attack toolkit that allows the remote attacker to perform various malicious actions on the compromised computer. Additional Information NeoSploit is a attack toolkit that allows the remote attacker to perform various malicious actions on the compromised computer. Affected Various Platforms Response NA
WebAttackNeosploitToolkitWebsite6 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackNetgainEnterpriseManagerCommandInjection Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote command injection vulnerability in Netgarin Enterprise Manager. Additional Information A command injection vulnerability exists in Netgain Enterprise Manager that can lead to execution of arbitrary commands. Affected NetGain Enterprise Manager versions 7.2.562 build 853 and below. Response
WebAttackNetgainEnterpriseManagerCVE-2017-16608 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote command injection vulnerability in Netgarin Enterprise Manager. Additional Information A command injection vulnerability exists in Netgain Enterprise Manager that can lead to execution of arbitrary commands. Affected NetGain Enterprise Manager versions 7.2.562 build 853 and below. Response
WebAttackNetGearBufferOverflowAttack Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description The researcher has created a proof-of-concept to demonstrate these issues. Please see the references for more information. Additional Information Netgear WNR2000 is a router. Netgear WNR2000 is prone to multiple security vulnerabilities: 1. An authentication-bypass vulnerability. Specifically, this issue affects the 'apply.cgi' script. [CVE-2016-10176] 2. An information disclosure vulnerability. Specifically, this issue occurs in 'apply_noauth.cgi' script. [CVE-2016-10175] 3. A stack-buffer overflow vulnerability. Specifically, this issue affects the 'apply.cgi' script. [CVE-2016-10174] Note: This issue affects the WNR2000 version 5 routers when remote administration is enabled. An attacker may leverage this issue to bypass the authentication mechanism and perform unauthorized actions, obtain sensitive information, or execute arbitrary code in the context of the affected application. Failed exploit attempts will likely cause a denial-of-service condition. Netgear WNR2000 firmware version 5 is affected; other versions may also be affected. Affected NETGEAR WNR2000
WebattackNetGearFVS318CVE-2005-0291 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description NetGear FVS318 ProSafe VPN Firewall switch is a commercially available Firewall/VPN/Router hardware device. Additional Information NetGear FVS318 ProSafe VPN Firewall switch is a commercially available Firewall/VPN/Router hardware device. NetGear FVS318 is reported prone to multiple vulnerabilities. These issues result from insufficient sanitization of user-supplied data and may allow an attacker to bypass URI filters and carry out cross-site scripting attacks. The following issues were identified: It is reported that an attacker can bypass URI filters of the device by using hexadecimal values in a URI. Apparently, the device fails to filter a potentially malicious URI when an equivalent URI containing hexadecimal values is supplied. This can allow an attacker to place potentially malicious files on a computer and carry out other attacks. This issue may also expose users of the product to unwanted malicious content. The URI filter log viewer is reported prone to a cross-site scripting vulnerability. It is reported that the Web application does not filter HTML and script code when storing restricted links in a log file. This can allow an attacker to craft a malicious link and send it to a vulnerable device. When an administrator views the device logs the attacker-supplied script code may be executed in their browser. A successful attack can lead to theft of cookie-based authentication credentials and other attacks. The research report specified that FVS318 devices with firmware 2.4 are vulnerable to these issues. FVS318 and FVS318v2 are shipped with firmware 2.4, however, it is possible that FVS318v3 and other firmware versions are affected as well. This BID will be updated when more information about affected packages is available. Affected NetGear FVS318 2.4 NetGear FVS318v2 2.4 Response Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] <mailto:[email protected]>.
WebAttackNetgearReadyNASSurveillanceRCE Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Netgear ReadyNAS Surveillance. Additional Information A critical vulnerability exists in Netgear ReadyNAS Surveillance configuration backup feature, that can lead to execution of arbitrary commands as root. Affected Netgear ReadyNAS Surveillance Response
WebAttackNetgearRouterArbitraryFileAccess Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit various vulnerabilities in Netgear routers. Additional Information Various models of Netgear routers have multiple vulnerabilities that can allow Authentication ByPass, Information Disclosure, Remote Code Execution and Command Injection Affected Various Netgear routers.
Web Attack: Netgear Router Authentication Bypass Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit various vulnerabilities in Netgear routers. Additional Information Various models of Netgear routers have multiple vulnerabilities that can allow Authentication ByPass, Information Disclosure, Remote Code Execution and Command Injection Affected Various Netgear routers.
Web Attack: Netgear Router Command Execute 2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit various vulnerabilities in Netgear routers. Additional Information Various models of Netgear routers have multiple vulnerabilities that can allow Authentication ByPass, Information Disclosure, Remote Code Execution and Command Injection Affected Various Netgear routers.
Web Attack: Netgear Router Command Injection Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit various vulnerabilities in Netgear routers. Additional Information Various models of Netgear routers have multiple vulnerabilities that can allow Authentication ByPass, Information Disclosure, Remote Code Execution and Command Injection Affected Various Netgear routers.
WebAttackNetgearRouterHTTPDBufferOverflow Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit various vulnerabilities in Netgear routers. Additional Information Various models of Netgear routers have multiple vulnerabilities that can allow Authentication ByPass, Information Disclosure, Remote Code Execution and Command Injection Affected Various Netgear routers.
Web Attack: Netgear Router Remote Command Execute Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit various vulnerabilities in Netgear routers. Additional Information Various models of Netgear routers have multiple vulnerabilities that can allow Authentication ByPass, Information Disclosure, Remote Code Execution and Command Injection Affected Various Netgear routers.
WebAttackNetlinkGPONRouterRCE Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit a remote code execution vulnerability in Netlink GPON routers. Additional Information Netlink GPON router suffers from a vulnerability that can lead to execution of arbitrary code. Affected Netlink GPON Router 1.0.11. Response
WebAttackNetNTLMInfostealerWebsite Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to steal information through JavaScript/HTML code Additional Information A malicious javascript/HTML, which steals user's login credentials and NetNTLM Challenge/Response, is injected in clean website, so when a user visits the compromised website, injected script will also send this stolen information to a remote malicious user Affected Various Windows machines. Response
Web Attack: Netscape Enterprise Server Directory Indexing CVE-2000-0236 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description This signature detects vulnerable HTTP parameters being sent to the Netscape HTTP server. Additional Information Netscape Enterprise Server 3.x includes a poorly documented feature that will allow remote users to view directory listings by appending various instructional tags to the URL. Although it can be disabled, Netscape Enterprise Server is shipped with the "Directory Indexing" feature enabled by default. Affected Netscape Enterprise Server 3.0, 3.6, 3.51 Response The Directory Indexing feature can be turned off via the Administration Interface. Selecting Content Management -> Document Preferences and changing Directory Indexing to "none" will disable this feature. Also, manually editing the file obj.conf will do the same. Conduct a search for the following: Service method="(GET|HEAD)" type="magnus-internal/directory"nfn="index-common" and replace fn="index-common" with fn="send-error". Netscape Enterprise Server 3.0: Netscape Patch SSL iPlanet Patch DisRend iPlanet Patch disrend.dll Netscape Enterprise Server 3.6: Netscape Patch SSL iPlanet Patch DisRend iPlanet Patch disrend.dll Netscape Enterprise Server 3.51: Netscape Patch SSL
Web Attack: Nette RCE Vulnerability CVE-2020-15227 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit vulnerability on the affected machine. Additional Information Nette versions before 2.0.19, 2.1.13, 2.2.10, 2.3.14, 2.4.16, 3.0.6 are vulnerable to an code injection attack by passing specially formed parameters to URL that may possibly leading to RCE. Nette is a PHP/Composer MVC Framework. Affected Nette versions before 2.0.19, 2.1.13, 2.2.10, 2.3.14, 2.4.16, 3.0.6 Response
Web Attack: Network Weathermap Editor CVE-2013-2618 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit an arbitrary code execution vulnerability in the Network Weathermap Editor. Additional Information Network Weathermap is a network visualization tool. Network Weathermap is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input submitted to the 'title field of the 'editor.php' script. Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible. Affected Network Weathermap 0.97a is vulnerable; other versions may also be affected.
WebAttackNeutrinoExploitKitDownload5 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from Neutrino toolkit that may compromise a computer through various vendor vulnerabilities. Additional Information Neutrino Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine. Affected This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities. Response Various Web Browsers
WebAttackNeutrinoExploitKitdownload9 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from Neutrino toolkit that may compromise a computer through various vendor vulnerabilities. Additional Information Neutrino Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine. Affected This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities. Response Various Web Browsers
WebAttackNeutrinoExploitKitRedirect Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer. Additional Information Microsoft Internet Explorer is prone to a remote code execution vulnerability that affects versions from 6-11. Affected Internet Explorer versions 6,7,8,9,10,11
WebAttackNeutrinoExploitKitRedirect2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from Neutrino toolkit that may compromise a computer through various vendor vulnerabilities. Additional Information Neutrino Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine. Affected This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities. Response Various Web Browsers
WebAttackNeutrinoExploitKitRedirect3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from Neutrino toolkit that may compromise a computer through various vendor vulnerabilities. Additional Information Neutrino Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine. Affected This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities. Response Various Web Browsers
WebAttackNeutrinoExploitKitRedirect4 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from Neutrino toolkit that may compromise a computer through various vendor vulnerabilities. Additional Information Neutrino Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine. Affected This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities. Response Various Web Browsers
WebAttackNeutrinoExploitKitRedirect5 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from Neutrino toolkit that may compromise a computer through various vendor vulnerabilities. Additional Information Neutrino Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine. Affected This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities. Response Various Web Browsers
WebAttackNeutrinoExploitKitRedirection Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from Neutrino toolkit that may compromise a computer through various vendor vulnerabilities. Additional Information Neutrino Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine. Affected This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities. Response Various Web Browsers
WebAttackNeutrinoExploitKitSWFDownload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from Neutrino toolkit that may compromise a computer through various vendor vulnerabilities. Additional Information Neutrino Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine. Affected This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities. Response Various Web Browsers
Web Attack: Neutrino Exploit Kit Website 10 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from Neutrino toolkit that may compromise a computer through various vendor vulnerabilities. Additional Information Neutrino Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine. Affected This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities. Response Various Web Browsers
Web Attack: Neutrino Exploit Kit Website 2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from Neutrino toolkit that may compromise a computer through various vendor vulnerabilities. Additional Information Neutrino Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine. Affected This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities. Response Various Web Browsers
WebAttackNeutrinoExploitKitWebsite25 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from Neutrino toolkit that may compromise a computer through various vendor vulnerabilities. Additional Information Neutrino Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine. Affected This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities. Response Various Web Browsers
WebAttackNeutrinoExploitKitWebsite27 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from Neutrino toolkit that may compromise a computer through various vendor vulnerabilities. Additional Information Neutrino Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine. Affected This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities. Response Various Web Browsers
WebAttackNeutrinoExploitKitWebsite3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from Neutrino toolkit that may compromise a computer through various vendor vulnerabilities. Additional Information Neutrino Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine. Affected This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities. Response Various Web Browsers
WebAttackNeutrinoExploitKitWebsite4 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from Neutrino toolkit that may compromise a computer through various vendor vulnerabilities. Additional Information Neutrino Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine. Affected This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities. Response Various Web Browsers
Web Attack: Neutrino Exploit Kit Website 5 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from Neutrino toolkit that may compromise a computer through various vendor vulnerabilities. Additional Information Neutrino Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine. Affected This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities. Response Various Web Browsers
Web Attack: Next.JS Path Traversal Vulnerability CVE-2020-5284 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a directory traversal vulnerability in next.js. Additional Information Next.js is prone to a path traversal vulnerability that can lead to exposure of sensitive files. Affected Next.js versions below 9.3.2. Response
Web Attack: Nginx Improper Path Normalization Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a path normalization vulnerability in nginx webserver. Additional Information A vulnerability exists in nginx webserver that can lead to exposure of sensitive local files stored outside the target on the webserver. Affected Various nginx webserver versions. Response
Web Attack: NodeJS Systeminformation OS Command Injection CVE-2021-21315 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in NodeJS. Additional Information A vulnerability exists in NodeJS System Information Library that can lead to injection of OS commands. Affected Systeminformation library before version 5.3.1. Response
WebattackNokiaelectronic Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description Nokia Electronic Documentation (NED) is a web-based documentation interface for Nokia products. Additional Information Nokia Electronic Documentation (NED) is a web-based documentation interface for Nokia products. NED is typically deployed on production networks for telecom operators. A vulnerability has been discovered in Nokia Electronic Documentation (NED) that may allow an attacker to redirect connections to external systems. The problem likely occurs due to the NED server failing to sufficiently verify hosts provided within specific HTTP requests. Specifically, by making an HTTP request to NED that includes the 'action' and 'location' URI parameters, it is possible to carry out a specific action on a defined location. As a result, an attacker may be capable of making a request that would cause data to be redirected to other systems. This may allow an attacker to interact with an otherwise inaccessible system, or potentially hide the origin of attacks launched against other targets. Affected Nokia Nokia Electronic Documentation 5.0 Response It has been reported that the vendor will be addressing this issue in a forthcoming release (5.1), which is due at the beginning of 2004. This has not been confirmed by Symantec. Affected users should contact the vendor for further information.
WebattackNokiaElectronicDocumentation Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description Nokia Electronic Documentation (NED) is a web-based documentation interface for Nokia products. Additional Information Nokia Electronic Documentation (NED) is a web-based documentation interface for Nokia products. NED is typically deployed on production networks for telecom operators. NED is prone to a vulnerability that may enable remote attackers to list directory contents for the web root directory. This issue may be exploited by appending a dot (.) to a request for a NED page. Exploitation will also have the side-effect of disclosing the path to the directory. This issue could be exploited to gather information about the NED installation and the underlying file system, which could be useful in mounting further attacks against the system. This issue was reported for NED installations hosted on WebLogic application servers. It is not known if NED is prone to the same behavior when hosted on other servers. It should be noted that although this vulnerability has been reported to affect Nokia Electronic Documentation version 5.0, previous versions might also be affected. Affected Nokia Nokia Electronic Documentation 5.0 Response It has been reported that the vendor will be addressing this issue in a forthcoming release (5.1), which is due at the beginning of 2004. This has not been confirmed by Symantec. Affected users should contact the vendor for further information.
Web Attack: Nostromo Remote Code Execution Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit vulnerability in nostromo. Additional Information Directory Traversal in the function http_verify in nostromo nhttpd through 1.9.6 allows an attacker to achieve remote code execution via a crafted HTTP request. Affected nostromo versions upto and including 1.9.6 Response
WebAttackNovellAssetManagementCVE-2011-2653 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Novell Zenworks Asset Management. Additional Information Novell ZENWorks Asset Management is used to manage IT assets in an organization. ZENworks Asset Management is prone to a remote code-execution vulnerability because it fails to handle unauthenticated file upload processes in the 'rtrlet' component. Specifically, the application fails to properly sanitize the path for directory traversal sequences ('../') and the name of the file for NULL-byte characters. An attacker can leverage this issue to upload an arbitrary file and place it in an arbitrary location on the affected system. Successful exploits will compromise the affected application, and the underlying system. Affected Novell ZENworks Asset Management 7.5
WebAttackNovellGroupwiseClientCVE-2012-0439 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a vulnerability in Novell Groupwise Client's ActiveX Control which may lead to remote code execution. Additional Information Novell GroupWise is collaboration software available for a number of platforms, including Linux and Microsoft Windows. Novell GroupWise Client allows users to access Novell services from remote computers. Novell GroupWise is prone to a remote code-execution vulnerability that affects the unspecified ActiveX component. Attackers can exploit this issue to execute arbitrary code within the context of the affected application that uses the ActiveX control (typically Internet Explorer). Failed exploit attempts will result in a denial-of-service condition. Affected Versions prior to GroupWise 8.0.3 Hot Patch 2 Versions prior to GroupWise 2012 SP1 Hot Patch 1
WebAttackNovellGroupwiseClientCVE-2012-04392 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a vulnerability in Novell Groupwise Client's ActiveX Control which may lead to remote code execution. Additional Information Novell GroupWise is collaboration software available for a number of platforms, including Linux and Microsoft Windows. Novell GroupWise Client allows users to access Novell services from remote computers. Novell GroupWise is prone to a remote code-execution vulnerability that affects the unspecified ActiveX component. Attackers can exploit this issue to execute arbitrary code within the context of the affected application that uses the ActiveX control (typically Internet Explorer). Failed exploit attempts will result in a denial-of-service condition. Affected Versions prior to GroupWise 8.0.3 Hot Patch 2 Versions prior to GroupWise 2012 SP1 Hot Patch 1
WebAttackNovellIManagerArbitraryFileUpload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Arbitrary file uploads in Novell iManager. Additional Information Novell iManager is a web-based management portal for various Novell products. The application is prone to an arbitrary-file-upload vulnerability because it fails to properly sanitize user-supplied input. Specifically, this issue affects the 'getMultiPartParameters()' when validating uploaded files. An attacker may leverage this issue to upload arbitrary files to the affected computer; this can result in arbitrary code execution within the context of the vulnerable application. Novell iManager 2.7.3.2 and prior are vulnerable. Affected Novell iManager 2.7.3.2 and prior are vulnerable. Response Updates are available. Please see the references for details.