text
stringlengths 0
383k
|
---|
WebAttackMSIEXMLDOMActiveXCVE-2013-73314
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a Information Disclosure vulnerability in Microsoft XMLDOM ActiveX.
Additional Information
Microsoft XMLDOM ActiveX control is prone to multiple information-disclosure vulnerabilities. Specifically, these issues affect unspecified methods that will allow website administrator to gain access to sensitive information through error codes.
Note: Very limited information is currently available regarding this issue. We will update this BID as more information emerges.
Attackers can exploit this issue by enticing an unsuspecting user to view a malicious webpage.
Successful exploits will allow attackers to obtain sensitive information like local drive letters, files, and directory names; that may aid in further attacks.
Affected
Microsoft Windows 8.1 and earlier
|
WebAttackMSIEXMLDOMActiveXCVE-2013-73315
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a Information Disclosure vulnerability in Microsoft XMLDOM ActiveX.
Additional Information
Microsoft XMLDOM ActiveX control is prone to multiple information-disclosure vulnerabilities. Specifically, these issues affect unspecified methods that will allow website administrator to gain access to sensitive information through error codes.
Note: Very limited information is currently available regarding this issue. We will update this BID as more information emerges.
Attackers can exploit this issue by enticing an unsuspecting user to view a malicious webpage.
Successful exploits will allow attackers to obtain sensitive information like local drive letters, files, and directory names; that may aid in further attacks.
Affected
Microsoft Windows 8.1 and earlier
|
Web Attack: MS IIS ASP Source Disclosure CVE-2000-0302
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
This signature detects attempts to exploit a vulnerability in IIS's handling of .asp extension files.
Additional Information
Index Server can be used to cause IIS to display the source of .asp and possibly other server-side processed files.
By appending a space (%20) to the end of the filename specified in the 'CiWebHitsFile' variable, and setting 'CiHiliteType' to 'Full' and 'CiRestriction' to 'None', it is possible to retrieve the unprocessed source of the file.
This is possible on any machine with Index Server installed, even those with no normal .htw files, because the virtual file null.htw is stored in memory and the .htw extension is mapped by default to webhits.dll.
Affected
Microsoft Index Server 2.0
Response
Vendor updates have been released.
For Microsoft Index Server 2.0:
Microsoft Q252463
|
WebAttackMSIISFrontPage98ExtensionsBufferOverflowVulnerability
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
This signature detects HTTP requests to directly access the dvwssr.dll.
Additional Information
The dvwssr.dll, included with the Microsoft FrontPage 98 extensions for Microsoft Internet Information Services (IIS) and shipped as part of the Microsoft NT Option Pack, has a remotely exploitable buffer overflow. This attack will result in the service no longer accepting connections, and may allow for remote code execution on the vulnerable host.
Affected
Microsoft FrontPage 98 Server Extensions for IIS
Microsoft InterDev 1.0
Response
Workaround:
Delete the DLL (this may break InterDev).
|
WebAttackMSInduSoftWebStudioDLLHijacking
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
InduSoft Web studio allows execution of arbitary code which may be delivered to user through remote WebDAV Shares.
Additional Information
InduSoft Web studio allows execution of REVERB1 if this DLL is located in the same folder than the .APP .The attacker must entice the user into opening the crafted .APP file.
Affected
Various Windows platforms
Response
NA
|
WebAttackMSInternetExplorerIEPeers.dllCVE-2010-0806
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects a remote code execution vulnerability in the Microsoft Internet Explorer.
Additional Information
Microsoft Internet Explorer is a browser for the Windows operating system.
Internet Explorer is prone to a remote code-execution vulnerability. The issue occurs because an invalid pointer may attempt to access an object after it has been deleted. This may cause memory to become corrupted. This issue affects the 'iepeers.dll' library.
Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks may cause denial-of-service conditions.
Affected
Microsoft Internet Explorer 6.0, 7.0
Response
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
|
WebAttackMSInternetExplorerMemoryCorruptionCVE-2011-1345
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature will detect attempts to exploit a memory corruption vulnerability in Internet Explorer.
Additional Information
A defect in object lifetime management causes Internet Explorer to release an object twice which can lead to a delayed crash or even remote code execution.
Affected
Various
|
WebAttackMSInternetExplorerMemoryCorruptionCVE-2011-13452
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature will detect attempts to exploit a memory corruption vulnerability in Internet Explorer.
Additional Information
A defect in object lifetime management causes Internet Explorer to release an object twice which can lead to a delayed crash or even remote code execution.
Affected
Various
|
WebAttackMSInternetExplorerSameIDPropertyCVE-2012-1875
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer.
Additional Information
Microsoft Internet Explorer is a browser for the Windows operating system.
Internet Explorer is prone to a remote code-execution vulnerability. Specifically, the problem occurs when accessing an object that has been deleted.
Attackers can exploit this issue by enticing an unsuspecting user into opening a specially crafted webpage.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions.
Affected
Microsoft Internet Explorer 8
|
WebAttackMSJETDBBufferOverflowCAN-2005-0944
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
This signature detects an attempt to overflow a buffer in MSJET40.DLL by exploiting a parsing error when opening an MDB file.
Additional Information
It is reported that Microsoft Jet Database Engine is vulnerable to a buffer overflow vulnerability. This issue is due to a failure of the library to properly bounds check user-supplied database file contents.
Attackers may exploit this vulnerability to execute arbitrary machine code in the context of the victim user attempting to access a malicious Jet database file.
This vulnerability is reported to exist in the 'msjet40.dll' library, version 4.00.8618.0. Older versions may also be affected. The 'msjetole40.dll' OLE (Object Linking and Embedding) library is reportedly immune to this vulnerability.
Affected
Microsoft JET 2.0, 2.5, 3.0, 3.5, 3.51, 3.51 SP3, 4.0, 4.0 SP1, 4.0 SP2, 4.0 SP3, 4.0 SP4, 4.0 SP5, 4.0 SP6, 4.0 SP7
Response
There are no known fixes for this issue. It is recommended that users upgrade to the latest version.
|
WebAttackMSMPEG2TuneRequestControlActiveXBOCVE-2008-0015
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects an attempt to instantiate BDATuner.MPEG2TuneRequest ActiveX object. Creation of this object may result in remote code execution which could compromise the target host.
Additional Information
Microsoft TV Technologies is a component that provides support for digital TV applications. It is available for Windows XP.
TV Technologies is prone to a remote code-execution vulnerability that affects the 'BDATuner.MPEG2TuneRequest.1' object and can be triggered when the object is instantiated with malformed input through the 'data' parameter. The object is associated with the following CLSID:
0955AC62-BF2E-4CBA-A2B9-A63F772D46CF
An attacker could exploit this issue by enticing a victim to visit a maliciously crafted site.
Successful exploits may allow an attacker to execute arbitrary code with the privileges of the user running the application.
Affected
Microsoft Windows XP Home SP2
Response
Download and install all patches from the vendor related to this vulnerability.
|
WebAttackMSOfficeWordRTFRCE1
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature will detect attempts to exploit a remote code execution vulnerability in MS Word.
Additional Information
Microsoft Office is prone to a remote stack-based buffer-overflow vulnerability because the software fails to perform adequate boundary-checks on user-supplied data. This issue occurs when the application parses property strings from specially crafted RTF data.
An attacker can exploit this issue by enticing an unsuspecting user to open a malicious RTF file or view an email in RTF format.
Successfully exploiting this issue would allow the attacker to corrupt memory and execute arbitrary code in the context of the currently logged-in user. Failed exploit attempts will result in a denial-of-service condition.
Affected
Microsoft Office
Response
The vendor has released an advisory and updates. Please see the references for more information.
|
WebAttackMSPowerPointSoundDataRCE1
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects a vulnerability in Microsoft PowerPoint which may result in remote code execution.
Additional Information
Microsoft PowerPoint is prone to multiple remote code-execution vulnerabilities caused by an error in the 'Importer' feature when the application parses PowerPoint 95 files. Specifically, stack-based memory becomes corrupted when handling maliciously constructed sound data included in a '.ppt' file. These issues occur in the 'PP7X32.DLL' library and can be triggered with user-supplied data for either a record length value or a record name string.
A successful exploit would allow an attacker to execute arbitrary code in the context of the currently logged-in user.
Affected
Microsoft PowerPoint
Response
The vendor has released an advisory and updates. Please see the references for details.
|
WebAttackMSPPTPServerBufferOverflow
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a buffer overflow vulnerability in the Microsoft PPTP server.
Additional Information
A buffer overflow vulnerability has been reported for Microsoft's PPTP (Point to Point Tunneling Protocol) implementation. The vulnerability reportedly exists in both the PPTP server and client applications. The PPTP service listens to traffic on TCP port 1723.
Reportedly, it is possible to exploit the buffer overflow condition prior to authentication. A remote attacker who sends a specially crafted PPTP packet to a vulnerable system may be able to cause the application to corrupt kernel memory.
It is also possible for an attacker to include malicious shell code and have it execute with the privileges of the PPTP process.
This vulnerability has been reported for PPTP implementations in Microsoft Windows 2000 and Windows XP operating systems.
Affected
Avaya DefinityOne Media Servers
Avaya IP600 Media Servers
Avaya S3400 Message Application Server
Avaya S8100 Media Servers
Microsoft Windows 2000 Advanced Server SP1, SP2, SP3
Microsoft Windows 2000 Datacenter Server SP1, SP2, SP3
Microsoft Windows 2000 Professional SP1, SP2, SP3
Microsoft Windows 2000 Server SP1, SP2, SP3
Microsoft Windows 2000 Terminal Services SP1, SP2, SP3
Microsoft Windows XP 64-bit Edition SP1
Microsoft Windows XP Home SP1
Microsoft Windows XP Professional SP1
Response
Workaround:
A suggested workaround to prevent exploitation of the PPTP client is to restrict access to the client by blocking the TCP port 1723.
Solution:
Microsoft has released fixes.
Microsoft Windows 2000 Advanced Server:
Microsoft Patch Q329834
Microsoft Windows 2000 Advanced Server SP1:
Microsoft Patch Q329834
Microsoft Windows 2000 Advanced Server SP2:
Microsoft Patch Q329834
Microsoft Windows 2000 Advanced Server SP3:
Microsoft Patch Q329834
Microsoft Windows 2000 Professional:
Microsoft Patch Q329834
Microsoft Windows 2000 Professional SP1:
Microsoft Patch Q329834
Microsoft Windows 2000 Professional SP2:
Microsoft Patch Q329834
Microsoft Windows 2000 Professional SP3:
Microsoft Patch Q329834
Microsoft Windows 2000 Server:
Microsoft Patch Q329834
Microsoft Windows 2000 Server SP1:
Microsoft Patch Q329834
Microsoft Windows 2000 Server SP2:
Microsoft Patch Q329834
Microsoft Windows 2000 Server SP3:
Microsoft Patch Q329834
Microsoft Windows 2000 Terminal Services:
Microsoft Patch Q329834
Microsoft Windows 2000 Terminal Services SP1:
Microsoft Patch Q329834
Microsoft Windows 2000 Terminal Services SP2:
Microsoft Patch Q329834
Microsoft Windows 2000 Terminal Services SP3:
Microsoft Patch Q329834
Microsoft Windows XP 64-bit Edition:
Microsoft Patch Q329834
Microsoft Windows XP 64-bit Edition SP1:
Microsoft Patch Q329834
Microsoft Windows XP Home:
Microsoft Patch Q329834
Microsoft Windows XP Home SP1:
Microsoft Patch Q329834
Microsoft Windows XP Professional:
Microsoft Patch Q329834
Microsoft Windows XP Professional SP1:
Microsoft Patch Q329834
|
WebAttackMSPPTViewerTextBytesAtomRCE
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects a vulnerability in Microsoft PowerPoint which may result in remote code execution.
Additional Information
Microsoft PowerPoint is a presentation application. PowerPoint Viewer lets users view presentations created in PowerPoint 97 and later versions.
PowerPoint Viewer is prone to a remote code-execution vulnerability because it fails to properly perform boundary checks on user-supplied data. A stack-based buffer overflow can be triggered when PowerPoint Viewer opens a specially crafted file containing a malformed size argument in 'TextBytesAtom' record data.
Successful exploits would allow an attacker to execute arbitrary code in the context of the currently logged-in user.
NOTE: The standalone version of PowerPoint Viewer has reached its end of life. Updates are provided to support PowerPoint 2003 users who created presentations with certain features that rely on PowerPoint Viewer.
Affected
Microsoft PowerPoint
Response
The vendor has released an advisory and updates. Please see the references for details.
|
WebAttackMSPublisherTextBoxProcessingRCE
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects a vulnerability in Microsoft Publisher which may result in remote code execution.
Additional Information
Microsoft Publisher is a desktop publishing application available for Microsoft Windows.
Publisher is prone to a buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied data. This issue occurs in the code responsible for converting files from the Publisher 97 format. Specifically, when parsing a Textbox item included in a Publisher 97 file, a buffer overflow may occur.
An attacker can exploit this issue by enticing a victim to open a malicious Publisher file.
Successful exploits would allow an attacker to execute arbitrary code in the context of the currently logged-in user.
Affected
Microsoft Publisher
Response
The vendor has released an advisory and updates. Please see the references for details.
|
WebAttackMSRatingsFileBufferOverflowCAN-2005-0555
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
This signature detects an attempt to exploit a buffer overflow vulnerability in the MS Rating file used by Internet Explorer.
Additional Information
A buffer overflow exists in the MSRATING.DLL, which is triggered when a malicious rsaci.rat file that contains a large name parameter is loaded.
Affected
Microsoft Internet Explorer 5.0.1, 5.0.1 SP1, 5.0.1 SP2, 5.0.1 SP3, 5.0.1 SP4, 5.5, 5.5 SP1, 5.5 SP2, 6.0, 6.0 SP1, 6.0 SP2
Response
It is recommended that users consult Microsoft for patch information on this vulnerability.
|
WebAttackMSSilverlightCVE-2013-00742
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a Double Dereference vulnerability in Microsoft Silverlight which may result in remote code execution.
Additional Information
Microsoft Silverlight is a web application framework that provides support for .NET applications. Its security model limits the privileges granted to .NET applications.
Silverlight is prone to a remote code-execution vulnerability due to a double dereference error. This may allow an attacker to access the memory in an unsafe manner using a specially crafted application. An attacker can exploit this issue to install programs, view, change, or delete data, or create new accounts with full user rights.
Successful exploit may allow an attacker to execute arbitrary code with the privileges of the currently logged-in user. Failed exploit attempts will likely result in a denial-of-service condition.
Affected
Microsoft Silverlight
|
WebAttackMSSilverlightCVE-2013-00743
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a Double Dereference vulnerability in Microsoft Silverlight which may result in remote code execution.
Additional Information
Microsoft Silverlight is a web application framework that provides support for .NET applications. Its security model limits the privileges granted to .NET applications.
Silverlight is prone to a remote code-execution vulnerability due to a double dereference error. This may allow an attacker to access the memory in an unsafe manner using a specially crafted application. An attacker can exploit this issue to install programs, view, change, or delete data, or create new accounts with full user rights.
Successful exploit may allow an attacker to execute arbitrary code with the privileges of the currently logged-in user. Failed exploit attempts will likely result in a denial-of-service condition.
Affected
Microsoft Silverlight
|
WebAttackMSSilverlightCVE-2013-00744
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a Double Dereference vulnerability in Microsoft Silverlight which may result in remote code execution.
Additional Information
Microsoft Silverlight is a web application framework that provides support for .NET applications. Its security model limits the privileges granted to .NET applications.
Silverlight is prone to a remote code-execution vulnerability due to a double dereference error. This may allow an attacker to access the memory in an unsafe manner using a specially crafted application. An attacker can exploit this issue to install programs, view, change, or delete data, or create new accounts with full user rights.
Successful exploit may allow an attacker to execute arbitrary code with the privileges of the currently logged-in user. Failed exploit attempts will likely result in a denial-of-service condition.
Affected
Microsoft Silverlight
|
WebAttackMSSilverlightCVE-2013-00745
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a Double Dereference vulnerability in Microsoft Silverlight which may result in remote code execution.
Additional Information
Microsoft Silverlight is a web application framework that provides support for .NET applications. Its security model limits the privileges granted to .NET applications.
Silverlight is prone to a remote code-execution vulnerability due to a double dereference error. This may allow an attacker to access the memory in an unsafe manner using a specially crafted application. An attacker can exploit this issue to install programs, view, change, or delete data, or create new accounts with full user rights.
Successful exploit may allow an attacker to execute arbitrary code with the privileges of the currently logged-in user. Failed exploit attempts will likely result in a denial-of-service condition.
Affected
Microsoft Silverlight
|
WebAttackMSSilverlightCVE-2013-00746
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a Double Dereference vulnerability in Microsoft Silverlight which may result in remote code execution.
Additional Information
Microsoft Silverlight is a web application framework that provides support for .NET applications. Its security model limits the privileges granted to .NET applications.
Silverlight is prone to a remote code-execution vulnerability due to a double dereference error. This may allow an attacker to access the memory in an unsafe manner using a specially crafted application. An attacker can exploit this issue to install programs, view, change, or delete data, or create new accounts with full user rights.
Successful exploit may allow an attacker to execute arbitrary code with the privileges of the currently logged-in user. Failed exploit attempts will likely result in a denial-of-service condition.
Affected
Microsoft Silverlight
|
WebAttackMSSilverlightCVE-2016-0034
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a Double Dereference vulnerability in Microsoft Silverlight which may result in remote code execution.
Additional Information
Microsoft Silverlight is a web application framework that provides support for .NET applications. Its security model limits the privileges granted to .NET applications.
Silverlight is prone to a remote code-execution vulnerability due to a double deference error. This may allow an attacker to access the memory in an unsafe manner using a specially crafted application. An attacker can exploit this issue to install programs, view, change, or delete data, or create new accounts with full user rights.
Successful exploit may allow an attacker to execute arbitrary code with the privileges of the currently logged-in user. Failed exploit attempts will likely result in a denial-of-service condition.
Affected
Microsoft Silverlight
Response
Updates are available. Please see the references or vendor advisory for more information.
|
WebAttackMSSilverlightCVE-2016-00342
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a Double Dereference vulnerability in Microsoft Silverlight which may result in remote code execution.
Additional Information
Microsoft Silverlight is a web application framework that provides support for .NET applications. Its security model limits the privileges granted to .NET applications.
Silverlight is prone to a remote code-execution vulnerability due to a double deference error. This may allow an attacker to access the memory in an unsafe manner using a specially crafted application. An attacker can exploit this issue to install programs, view, change, or delete data, or create new accounts with full user rights.
Successful exploit may allow an attacker to execute arbitrary code with the privileges of the currently logged-in user. Failed exploit attempts will likely result in a denial-of-service condition.
Affected
Microsoft Silverlight
Response
Updates are available. Please see the references or vendor advisory for more information.
|
WebAttackMSSpeechCOMObjectMemoryCorruptionVulnerability
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a vulnerability in the Microsoft Speech API 4 which could result in remote code execution.
Additional Information
Microsoft Internet Explorer is prone to multiple buffer-overflow vulnerabilities when instantiating certain COM objects.
An attacker may exploit these issues by enticing victims into opening a maliciously crafted webpage.
The vulnerability resides in the ActiveListen and ActiveVoice speech controls of the Speech API 4. The following COM object CLSIDs and corresponding DLLs are affected:
- {4E3D9D1F-0C63-11D1-8BFB-0060081841DE}, Xlisten.dll
- {EEE78591-FE22-11D0-8BEF-0060081841DE}, Xvoice.dll
Successfully exploiting these issues allows remote attackers to execute arbitrary machine code in the context of the affected application, facilitating the remote compromise of affected computers.
Affected
Internet Explorer 5.01
Internet Explorer 6 Service Pack 1
Internet Explorer 6
Internet Explorer 7
Response
Download all applicable patches from the vendor and ensure that all patches are applied.
|
WebAttackMSSQLLongRequestHelloBO
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
This signature detects an attempt to exploit a vulnerability in MS SQL.
Additional Information
A vulnerability has been discovered in Microsoft SQL Server that could make it possible for remote attackers to gain access to target hosts.
It is possible for an attacker to cause a buffer overflow condition on the vulnerable SQL server with a malformed login request.
This vulnerability reportedly occurs even before authentication can proceed. Microsoft SQL Server listens for connections on TCP port 1433.
An attacker can exploit this vulnerability by sending specially crafted packets to TCP port 1433 which causes SQL Server to crash and possibly execute attacker supplied code.
It is possible that this issue may be remotely exploitable to execute arbitrary code as the SQL Server process.
This vulnerability was reported in BugTraq ID 5868, Multiple Microsoft SQL Server Vulnerabilities.
Affected
Microsoft Data Engine 2000
Microsoft SQL Server 2000 SP1, SP2
Response
Microsoft has revised their advisory. Microsoft recommends that users of SQL 2000 and MSDE 2000 apply the patch from MS02-061 which contains additional security fixes:
Microsoft SQL Server 2000:
Microsoft Patch Q280380
Microsoft Patch Q299717
Microsoft Patch Q298012
Microsoft Upgrade sql2ksp2
Microsoft Hotfix KillPwd.exe
Microsoft Service Pack sql2ksp3
Microsoft Data Engine 2000:
Microsoft Patch Q323875_SQL2000_SP2_en
Microsoft SQL Server 2000 SP1:
Microsoft Patch Q299717
Microsoft Patch Q298012
Microsoft Hotfix s80428i
Microsoft Upgrade sql2ksp2
Microsoft Service Pack sql2ksp3
Microsoft SQL Server 2000 SP2:
Microsoft Patch Q316333
Microsoft Patch Q316333
Microsoft Patch SQLXML2_Q321460
Microsoft Patch Q321858_SQL_Security_MDAC26
Microsoft Patch Q321858_SQL_Security_MDAC27
Microsoft Patch SQLXML3_Q320833
Microsoft Patch Q316333
Microsoft Patch Q316333
Microsoft Patch Q316333
Microsoft Patch Q323875_SQL2000_SP2_en
Microsoft Patch Q316333
Microsoft Patch Q316333
Microsoft Patch Q316333
Microsoft Service Pack sql2ksp3
Microsoft Patch Q316333
|
WebAttackMSSQLPacketResolutionDoS
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
This signature detects an attempt to exploit a denial of service vulnerability in MS SQL.
Additional Information
A vulnerability has been discovered in Microsoft SQL Server 2000 that could make it possible for remote attackers to gain access to target hosts.
A problem in the SQL Server Resolution Service makes it possible for a remote user to execute arbitrary code on a vulnerable host. An attacker could exploit a heap-based overflow in the resolution service by sending a maliciously crafted UDP packet to port 1434.
UDP port 1434 is designated as the Microsoft SQL Monitor port. Clients connect to this port to discover how connections to SQL Server should be made. When SQL Server receives a packet that starts with byte 0x08 followed by an overly long string and ending with a ':' and terminated by a number, the heap overflow is triggered. This causes key memory structures necessary for normal operations to be corrupted.
If the packet consists of data not specifically designed to cause code execution, a denial of service may result. It may be possible to custom-craft the exploit code to execute arbitrary instructions in the security context of the SQL Server. This may provide a remote attacker with local access on the underlying host.
***UPDATE:
On January 25 2003, DeepSight TMS detected a significant increase in UDP traffic destined for port 1434. Port 1434 is associated with Microsoft SQL Server. Initial analysis has suggested the presence of a new worm that is propagating rapidly through hosts running SQL Server.
The worm can use significant amounts of bandwidth. It was originally suspected that this was due to a denial of service attack built into the worm. It has turned out that this is not the case -- the bandwidth consumption is due to aggressive propagation.
At this time it is suspected that the worm may exploit BID 5310 or 5311. This is not yet confirmed.
Administrators are advised to block all external access to database servers until more information is available. Access to TCP and UDP ports 1434 should be denied completely. Additionally, implementing filter rules for other ports may also decrease the chances of compromise through yet unknown avenues. This should be done even if the patch for this particular vulnerability has been installed.
Cisco has released an advisory that details workaround information. Microsoft recommends that affected users apply SQL Server 2000 Service Pack 3.
Affected
Microsoft Data Engine 2000
Microsoft SQL Server 2000 SP1, SP2
Veritas Software Backup Exec for Windows Servers 9.0
Response
Prior to installing the fixes, administrators are advised to ensure that all SQL Server processes are inactive. Ensure that all installations of SQL server are patched and reboot the system before restarting the SQL server.
Veritas Software Backup Exec 9.0 ships with some MSDE components and may therefore be prone to this vulnerability. Users are advised to apply the Microsoft fixes to address this vulnerability for Backup Exec.
A specific fix has been released for the Microsoft .NET Framework SDK. See the References section for a link to Microsoft Knowledge Base article 813850 for instructions and download information.
Fixes available:
Microsoft SQL Server 2000:
Microsoft Patch Q280380
Microsoft Patch Q299717
Microsoft Patch Q298012
Microsoft Upgrade sql2ksp2
Microsoft Hotfix KillPwd.exe
Microsoft Service Pack sql2ksp3
Microsoft Data Engine 2000:
Microsoft Patch Q323875_SQL2000_SP2_en
Microsoft SQL Server 2000 SP1:
Microsoft Patch Q299717
Microsoft Patch Q298012
Microsoft Hotfix s80428i
Microsoft Upgrade sql2ksp2
Microsoft Service Pack sql2ksp3
Microsoft SQL Server 2000 SP2:
Microsoft Patch Q316333
Microsoft Patch Q316333
Microsoft Patch SQLXML2_Q321460
Microsoft Patch Q321858_SQL_Security_MDAC26
Microsoft Patch Q321858_SQL_Security_MDAC27
Microsoft Patch SQLXML3_Q320833
Microsoft Patch Q316333
Microsoft Patch Q316333
Microsoft Patch Q316333
Microsoft Patch Q323875_SQL2000_SP2_en
Microsoft Patch Q316333
Microsoft Patch Q316333
Microsoft Patch Q316333
Microsoft Service Pack sql2ksp3
Microsoft Patch Q316333
|
WebAttackMSSQLServerCVE-2012-2552
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects a Cross Site Scripting attack on SQL Server Reporting services.
Additional Information
Cross Site Scripting attacks on SQL Server reporting services can result in embedding of script tags in URLs and enticing unsuspecting users to click on them, ensuring that the malicious Javascript gets executed on the victim's machine.
Affected
SQL Server
|
WebAttackMSTDCCTLControlActiveX
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature will detect attempts to exploit a buffer overflow vulnerability in IE Tabular ActiveX Control.
Additional Information
There is a vulnerability in the IE tabular control in a way that IE handles certain DOM operations that could lead to crash or remote code execution.
Affected
IE 6.0
|
WebAttackMSTrueTypeFontCVE-2012-2897
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Microsoft TrueType Font parsing engine.
Additional Information
A vulnerability exists in Microsoft Win32k TrueType Font parsing engine that can lead to execution of arbitrary code on the machine.
Affected
Various Windows Platforms.
|
Web Attack: MS Visual Studio RAD Support Buffer Overflow CVE-2001-0341
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit the Microsft Visual Studio RAD Support Buffer Overflow vulnerability.
Additional Information
FrontPage Server Extensions (FPSE) ships with Microsoft Office 2000 and Office XP. FPSE are components that run on IIS servers and are used for the development of Web sites via FrontPage and Visual InterDev.
Visual InterDev is a member of the Visual Studio Web development tools, and is used to design Web applications that bring together Web content, database resources, and various programs. A subcomponent of FPSE, called Visual InterDev RAD Remote Deployment Support, enables the Visual InterDev developer to easily register COM objects on a Web server.
Due to an unchecked buffer in 'fp30reg.dll' of Visual InterDev RAD Remote Deployment Support, a user could execute arbitrary commands on a target host. If the host is running IIS 5.0, the commands could be executed in the context of IWAM_machinename. A host running IIS 4.0 could allow the execution of arbitrary commands in the SYSTEM context.
The problem lies in the section of code that specifically processes COM object register requests (fp30reg.dll). If a specially crafted request composed of 258 bytes is sent to a server with RAD Remote Deployment Support installed, the buffer could overrun and allow the execution of arbitrary code.
Note that Visual Studio RAD Deployment Support must be manually installed and configured by a user. It is not installed by default.
Successful exploitation of this vulnerability could lead to a complete compromise of the host.
Affected
Microsoft Windows 2000 Advanced Server SP1, SP2
Microsoft Windows 2000 Datacenter Server SP1, SP2
Microsoft Windows 2000 Professional SP1, SP2
Microsoft Windows 2000 Server SP1, SP2
Microsoft Windows 2000 Terminal Services SP1, SP2
Microsoft Windows NT Enterprise Server 4.0, 4.0 SP1, 4.0 SP2, 4.0 SP3, 4.0 SP4, 4.0 SP5, 4.0 SP6, 4.0 SP6a
Microsoft Windows NT Server 4.0, 4.0 SP1, 4.0 SP2, 4.0 SP3, 4.0 SP4, 4.0 SP5, 4.0 SP6, 4.0 SP6a
Microsoft Windows NT Terminal Server 4.0, 4.0 SP1, 4.0 SP2, 4.0 SP3, 4.0 SP4, 4.0 SP5, 4.0 SP6
Microsoft Windows NT Workstation 4.0, 4.0 SP1, 4.0 SP2, 4.0 SP3, 4.0 SP4, 4.0 SP5, 4.0 SP6, 4.0 SP6a
|
WebAttackMSWindowsExplorerCodeExecutionVulnerability
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a code execution vulnerability in Windows Explorer when opening a malformed search file.
Additional Information
A remote code execution vulnerability exists when saving a specially crafted search file within Windows Explorer. This operation causes Windows Explorer to exit and restart in an exploitable manner.
To view this vulnerability as a standard entry in the Common Vulnerabilities and Exposures list, see CVE-2008-1435.
Affected
Windows Vista
Windows Vista SP1
Windows Vista x64 Edition
Windows Vista x64 Edition SP1
Windows Server 2008
Response
Download and install all vendor patched related to this vulnerability.
|
WebAttackMSWindowsMSHTAShellExecution
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects an OLE Compound File Format Document with an embedded MSHTA CLSID.
Additional Information
Microsoft Windows is prone to a vulnerability that may allow remote attackers to execute code through the Windows Shell. The cause of the vulnerability is related to how the operating system handles unregistered file types. The specific issue is that files with an unknown extension may be opened with the application specified in the embedded CLSID. Microsoft has reported that, as a result, it may be possible to force the Windows Shell to execute the HTML Application Host.
The victim would be required to open a malicious file, possibly hosted on a Web site or sent through email. The nature of the vulnerability would require the attacker to trick the user into thinking the file is of a trusted type, such as obfuscating the file extension so that the victim may think it is a Word document when it is in fact an unregistered file type.
Successful exploitation will result in execution of arbitrary code in the context of the victim user. It has been demonstrated that the issue can be exploited through malicious '.hta' content disguised as a Word document. Other unregistered file extensions may also present the issue.
This vulnerability may bypass a security feature of Windows XP SP2 that would warn users when they are about to execute unsigned content originating from a remote source.
Affected
Microsoft Windows 2000 Advanced Server SP1, SP2, SP3, SP4
Microsoft Windows 2000 Datacenter Server SP1, SP2, SP3, SP4
Microsoft Windows 2000 Professional SP1, SP2, SP3, SP4
Microsoft Windows 2000 Server SP1, SP2, SP3, SP4
Microsoft Windows 98
Microsoft Windows 98SE
Microsoft Windows ME
Microsoft Windows Server 2003 Datacenter Edition
Microsoft Windows Server 2003 Enterprise Edition
Microsoft Windows Server 2003 Standard Edition
Microsoft Windows Server 2003 Web Edition
Microsoft Windows XP 64-bit Edition SP1
Microsoft Windows XP 64-bit Edition Version 2003 SP1
Microsoft Windows XP Home SP1, SP2
Microsoft Windows XP Media Center Edition SP1, SP2
Microsoft Windows XP Professional SP1, SP2
Microsoft Windows XP Tablet PC Edition SP1, SP2
Response
Workaround:
It may be possible to mitigate attacks that abuse the HTML Application Host by disabling it. This will not eliminate the vulnerability, but it may limit exposure to a known attack vector. Further information may be found in the attached Microsoft advisory.
Solution:
Microsoft has released fixes to address this vulnerability on supported platforms.
Microsoft Windows 2000 Advanced Server SP3:
Microsoft Patch Security Update for Windows 2000 (KB893086)
Microsoft Windows 2000 Advanced Server SP4:
Microsoft Patch Security Update for Windows 2000 (KB893086)
Microsoft Windows 2000 Datacenter Server SP3:
Microsoft Patch Security Update for Windows 2000 (KB893086)
Microsoft Windows 2000 Datacenter Server SP4:
Microsoft Patch Security Update for Windows 2000 (KB893086)
Microsoft Windows 2000 Professional SP3:
Microsoft Patch Security Update for Windows 2000 (KB893086)
Microsoft Windows 2000 Professional SP4:
Microsoft Patch Security Update for Windows 2000 (KB893086)
Microsoft Windows Server 2003 Enterprise Edition:
Microsoft Patch Security Update for Windows Server 2003 (KB893086)
Microsoft Windows Server 2003 Standard Edition:
Microsoft Patch Security Update for Windows Server 2003 (KB893086)
Microsoft Windows Server 2003 Web Edition:
Microsoft Patch Security Update for Windows Server 2003 (KB893086)
Microsoft Windows XP 64-bit Edition SP1:
Microsoft Patch Security Update for Windows XP 64-bit Edition (KB893086)
Microsoft Windows XP Home SP1:
Microsoft Patch Security Update for Windows XP (KB893086)
Microsoft Windows XP Home SP2:
Microsoft Patch Security Update for Windows XP (KB893086)
Microsoft Windows XP Media Center Edition SP1:
Microsoft Patch Security Update for Windows XP (KB893086)
Microsoft Windows XP Media Center Edition SP2:
Microsoft Patch Security Update for Windows XP (KB893086)
Microsoft Windows XP Professional SP1:
Microsoft Patch Security Update for Windows XP (KB893086)
Microsoft Windows XP Professional SP2:
Microsoft Patch Security Update for Windows XP (KB893086)
Microsoft Windows XP Tablet PC Edition SP1:
Microsoft Patch Security Update for Windows XP (KB893086)
Microsoft Windows XP Tablet PC Edition SP2:
Microsoft Patch Security Update for Windows XP (KB893086)
|
WebAttackMSWindowsOTFCVE-2015-2426
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Windows OpenType Font Driver.
Additional Information
Microsoft Windows is prone to a remote code-execution vulnerability. Specifically, this issue occurs when the Windows Adobe Type Manager Library fails to properly handle specially-crafted OpenType fonts.
Successful exploits allow attackers to execute arbitrary code in the context of the vulnerable application. Failed exploit attempts will result in a denial-of-service condition.
Affected
Microsoft Windows Vista Service Pack 2 0
Microsoft Windows Server 2008 R2 for x64-based Systems SP1
Microsoft Windows Server 2008 for x64-based Systems SP2
Microsoft Windows Server 2008 for Itanium-based Systems SP2
Microsoft Windows Server 2008 for 32-bit Systems SP2
Microsoft Windows 7 for x64-based Systems SP1
Microsoft Windows 7 for 32-bit Systems SP1
|
WebAttackMSWMIToolCVE-2010-3973
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to arbitrary code execution in activex WBEMSingleView.ocx of WMI Administrative Tools.
Additional Information
WMI Administrative Tools is prone to a vulnerability that lets attackers execute arbitrary code.WBEMSingleView.ocx has a method AddContextRef,which could directly call the address give as parameters.
Successfully exploiting these issues will allow attackers to execute arbitrary within the context of the application (typically Internet Explorer) that uses the ActiveX control.
Affected
IE
|
WebAttackMSWordembedMaliciousFlash2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects an unspecified vulnerability in a MS Word document which will result in dropping a backdoor on the exploited machine.
Additional Information
A remote code execution vulnerability exists in the way that Office handles specially crafted MS Word document files (.doc). The vulnerability could allow remote code execution if a user opens a specially crafted .doc file and will result in being infected with a backdoor. An attacker who successfully exploited this vulnerability could take control of an affected system with this backdoor. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
Affected
Microsoft Word 2002 Service Pack 3
Response
Download and install all vendor patches related to this vulnerability.
|
WebAttackMSWordembedSuspiciousFlash
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects an unspecified vulnerability in a MS Word document which will result in dropping a backdoor on the exploited machine.
Additional Information
A remote code execution vulnerability exists in the way that Office handles specially crafted MS Word document files (.doc). The vulnerability could allow remote code execution if a user opens a specially crafted .doc file and will result in being infected with a backdoor. An attacker who successfully exploited this vulnerability could take control of an affected system with this backdoor. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
Affected
Microsoft Word 2002 Service Pack 3
Response
Download and install all vendor patches related to this vulnerability.
|
Web Attack: Muieblackcat Scanner Request
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects Muieblackcat scanner activity.
Additional Information
Muieblackcat scanner can be used in gathering sensitive information from the remote server.
Affected
Various Platforms.
Response
|
WebAttackMusicAnimationMachineMIDIPlayerBO
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects an attempt to exploit a stack based buffer overflow vulnerability in Music Animation Machine MIDI Player which could result in remote code execution or cause a denial-of-service.
Additional Information
Music Animation Machine MIDI Player is a multimedia player.
The application is prone to a remote stack-based buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input. Specifically, this issue occurs when parsing a specially crafted 'MAMX' file.
Successfully exploiting this issue may allow remote attackers to execute arbitrary code in the context of the vulnerable application. Failed attacks will cause denial-of-service conditions.
Affected
Music Animation Machine MIDI Player 2006aug19 Release 035 is vulnerable; other versions may also be affected.
|
WebAttackMVPowerDVRShellUnauthenticatedCommandExecution
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts by metasploit to upload files into vulnerable applications and servers.
Additional Information
There exists an file upload vulnerablity in several applications that could result to remote code execution.
Affected
Multipile
|
WebAttackMyBBAdminControlCVE-2022-24734
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to exploit Remote Code Injection vulnerability on the affected machine.
Additional Information
MyBB Admin Control is vulnerable to Remote Code Injection attack. Successfully exploiting these issues will allow attackers to execute arbitrary code within the context of the application.
Affected
MyBB prior to version 1.8.30
Response
|
WebattackMynewsgroups
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
MyNewsGroups is a web-based news reader implemented in PHP.
Additional Information
MyNewsGroups is a web-based news reader implemented in PHP.
MyNewsGroups is prone to a remote file-include vulnerability because it fails to properly sanitize user-supplied input to the 'myng_root' parameter of the 'layersmenu.inc.php' script.
An attacker can exploit this issue to include an arbitrary remote file containing malicious PHP code and execute it in the context of the webserver process. This may allow the attacker to compromise the application and to gain access to the underlying system.
This issue affects version 0.6b; other versions may also be vulnerable.
Affected
MyNewsGroups MyNewsGroups 0.6b
Response
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected]:[email protected].
|
Web Attack: MySQL Suspicious Function Create Request
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to create custom functions on MySQL server.
Additional Information
Malicious plugins can be uploaded and imported into MySQL DB that can be utilized to create custom function and download malwares on to the system.
Affected
MySQL Database Servers.
Response
|
Web Attack: Mythic Tool Payload Activity
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects Mythic network activity on the affected machine.
Additional Information
Mythic is a cross-platform, post-exploit, red teaming framework built with python3, docker, docker-compose, and a web browser UI. It's designed to provide a collaborative and user friendly interface for operators, managers, and reporting throughout red teaming.
Affected
Various operating systems
Response
|
Web Attack: Mythic Tool Payload Download
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects Mythic network activity on the affected machine.
Additional Information
Mythic is a cross-platform, post-exploit, red teaming framework built with python3, docker, docker-compose, and a web browser UI. It's designed to provide a collaborative and user friendly interface for operators, managers, and reporting throughout red teaming.
Affected
Various operating systems
Response
|
WebAttackNagiosAuthenticatedRCE
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a vulnerability in Nagios XI.
Additional Information
Nagios is a Log Management Software. A vulnerability exists in Nagios XI before 5.6.6 which allows execution of arbitrary commands as root. A single authentication is required for exploitation.
Affected
Nagios XI before 5.6.6
Response
Upgrading to latest version eliminates the vulnerability.
|
WebAttackNagiosXICommandInjectionCVE-2018-15708
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to exploit Command Injection vulnerability on the affected machine.
Additional Information
Nagios XI is an IT infrastructure monitoring system.
Nagios XI is prone to a command-injection vulnerability that exists in the 'MagpieRSS library'. Specifically, this issue affects the HTTP GET 'url' parameter within the 'magpie_debug.php' script. An attacker can exploit this issue to inject arbitrary arguments into the curl command and write arbitrary data to a location within the privileges of the Apache user.
Successfully exploiting this issue may allow an attacker to execute arbitrary commands in the context of the affected application.
Affected
Nagios XI 5.5.6 is vulnerable; other versions may also be affected.
Response
Updates are available. Please see the references or vendor advisory for more information.
|
Web Attack: Nagios Xi Cross Site Scripting Vulnerability CVE-2021-25299
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to exploit Cross Site Scripting vulnerability on the affected machine.
Additional Information
Nagios XI version xi-5.7.5 is affected by cross-site scripting (XSS). The vulnerability exists in the file /usr/local/nagiosxi/html/admin/sshterm.php due to improper sanitization of user-controlled input. A maliciously crafted URL, when clicked by an admin user, can be used to steal his/her session cookies or it can be chained with the previous bugs to get one-click remote command execution (RCE) on the Nagios XI server.
Affected
Nagios XI version xi-5.7.5
Response
|
WebAttackNebulaExploitKitWebsite
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackNebulaPayloadDownload
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackNeosploitToolkitFileDownload
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects an attempt to download malicious files related to Trojan.Mebroot which may compromise the target host.
Additional Information
Trojan.Mebroot is a Trojan horse that overwrites the Master Boot Record of the hard disk and uses rootkit techniques to hide itself.
It has been reported that this threat may be installed from the following location using browser exploits:
[http://]gfeptwe.com[REMOVED]
When the Trojan is executed, it creates the following mutex so that only one instance of it is running on the compromised computer at any time:
Global\7BC8413E-DEF5-4BF6-9530-9EAD7F45338B
It then reads the Master Boot Record (MBR) and then scans the partition table to find the active boot partition of the computer.
The Trojan infects the MBR, copying the original MBR to sector 62 on the hard disk.
It then installs its own kernel loader to sectors 60 and 61 of the hard disk.
Next, it copies a rootkit driver near the end of the active boot partition. The Trojan overwrites around 1149 sectors (467 KB) when copying the driver.
Next, the Trojan creates a .dll file in the current folder where it is executed and then runs the following command:
regsvr32 /s [TROJAN FILE NAME].dll
Note: It has been reported that the file name could be mat[RANDOM NUMBER].dll.
It may then restart the compromised computer or display the following message:
Some updates require you to restart your computer to complete the update process. Be sure to save any work prior to the scheduled time.
When the computer restarts, the infected MBR will start the kernel loader located in sectors 60 and 61, which patches the Windows Kernel in memory to load the rootkit driver.
The rootkit driver then hooks the following kernel routines:
* IRP_MJ_READ
* IRP_MJ_WRITE
If sector 0 is read from hard disk, the Trojan will return the original MBR backup stored at sector 62. It will also try to block writing to sector 0, in order to prevent removal.
The Trojan also opens a back door, which attempts to bypass the local firewall and connect to the following location,allowing an attacker to control the compromised computer:
[http://]dkfhchkb.com/ser[REMOVED]
The Trojan may also inject additional code into usermode processes.
Affected
Windows 2000, Windows Server 2003, Windows Vista, Windows XP
Response
1. Restart the computer using the Windows Recovery Console.
2. Disable System Restore (Windows Me/XP).
3. Update the virus definitions.
4. Run a full system scan.
|
WebAttackNeosploitToolkitJARDownload
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects an attempt to download malicious files related to Trojan.Mebroot which may compromise the target host.
Additional Information
Trojan.Mebroot is a Trojan horse that overwrites the Master Boot Record of the hard disk and uses rootkit techniques to hide itself.
It has been reported that this threat may be installed from the following location using browser exploits:
[http://]gfeptwe.com[REMOVED]
When the Trojan is executed, it creates the following mutex so that only one instance of it is running on the compromised computer at any time:
Global\7BC8413E-DEF5-4BF6-9530-9EAD7F45338B
It then reads the Master Boot Record (MBR) and then scans the partition table to find the active boot partition of the computer.
The Trojan infects the MBR, copying the original MBR to sector 62 on the hard disk.
It then installs its own kernel loader to sectors 60 and 61 of the hard disk.
Next, it copies a rootkit driver near the end of the active boot partition. The Trojan overwrites around 1149 sectors (467 KB) when copying the driver.
Next, the Trojan creates a .dll file in the current folder where it is executed and then runs the following command:
regsvr32 /s [TROJAN FILE NAME].dll
Note: It has been reported that the file name could be mat[RANDOM NUMBER].dll.
It may then restart the compromised computer or display the following message:
Some updates require you to restart your computer to complete the update process. Be sure to save any work prior to the scheduled time.
When the computer restarts, the infected MBR will start the kernel loader located in sectors 60 and 61, which patches the Windows Kernel in memory to load the rootkit driver.
The rootkit driver then hooks the following kernel routines:
* IRP_MJ_READ
* IRP_MJ_WRITE
If sector 0 is read from hard disk, the Trojan will return the original MBR backup stored at sector 62. It will also try to block writing to sector 0, in order to prevent removal.
The Trojan also opens a back door, which attempts to bypass the local firewall and connect to the following location,allowing an attacker to control the compromised computer:
[http://]dkfhchkb.com/ser[REMOVED]
The Trojan may also inject additional code into usermode processes.
Affected
Windows 2000, Windows Server 2003, Windows Vista, Windows XP
Response
1. Restart the computer using the Windows Recovery Console.
2. Disable System Restore (Windows Me/XP).
3. Update the virus definitions.
4. Run a full system scan.
|
WebAttackNeosploitToolkitPDFDownload
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects an attempt to download malicious files related to Trojan.Mebroot which may compromise the target host.
Additional Information
Trojan.Mebroot is a Trojan horse that overwrites the Master Boot Record of the hard disk and uses rootkit techniques to hide itself.
It has been reported that this threat may be installed from the following location using browser exploits:
[http://]gfeptwe.com[REMOVED]
When the Trojan is executed, it creates the following mutex so that only one instance of it is running on the compromised computer at any time:
Global\7BC8413E-DEF5-4BF6-9530-9EAD7F45338B
It then reads the Master Boot Record (MBR) and then scans the partition table to find the active boot partition of the computer.
The Trojan infects the MBR, copying the original MBR to sector 62 on the hard disk.
It then installs its own kernel loader to sectors 60 and 61 of the hard disk.
Next, it copies a rootkit driver near the end of the active boot partition. The Trojan overwrites around 1149 sectors (467 KB) when copying the driver.
Next, the Trojan creates a .dll file in the current folder where it is executed and then runs the following command:
regsvr32 /s [TROJAN FILE NAME].dll
Note: It has been reported that the file name could be mat[RANDOM NUMBER].dll.
It may then restart the compromised computer or display the following message:
Some updates require you to restart your computer to complete the update process. Be sure to save any work prior to the scheduled time.
When the computer restarts, the infected MBR will start the kernel loader located in sectors 60 and 61, which patches the Windows Kernel in memory to load the rootkit driver.
The rootkit driver then hooks the following kernel routines:
* IRP_MJ_READ
* IRP_MJ_WRITE
If sector 0 is read from hard disk, the Trojan will return the original MBR backup stored at sector 62. It will also try to block writing to sector 0, in order to prevent removal.
The Trojan also opens a back door, which attempts to bypass the local firewall and connect to the following location,allowing an attacker to control the compromised computer:
[http://]dkfhchkb.com/ser[REMOVED]
The Trojan may also inject additional code into usermode processes.
Affected
Windows 2000, Windows Server 2003, Windows Vista, Windows XP
Response
1. Restart the computer using the Windows Recovery Console.
2. Disable System Restore (Windows Me/XP).
3. Update the virus definitions.
4. Run a full system scan.
|
WebAttackNeosploitToolkitRedirect
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempt to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Affected
Various
Response
Update all vendor patches to the latest versions.
|
WebAttackNeosploitToolkitWebsite3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects an attempt to download malicious files related to Trojan.Mebroot which may compromise the target host.
Additional Information
Trojan.Mebroot is a Trojan horse that overwrites the Master Boot Record of the hard disk and uses rootkit techniques to hide itself.
It has been reported that this threat may be installed from the following location using browser exploits:
[http://]gfeptwe.com[REMOVED]
When the Trojan is executed, it creates the following mutex so that only one instance of it is running on the compromised computer at any time:
Global\7BC8413E-DEF5-4BF6-9530-9EAD7F45338B
It then reads the Master Boot Record (MBR) and then scans the partition table to find the active boot partition of the computer.
The Trojan infects the MBR, copying the original MBR to sector 62 on the hard disk.
It then installs its own kernel loader to sectors 60 and 61 of the hard disk.
Next, it copies a rootkit driver near the end of the active boot partition. The Trojan overwrites around 1149 sectors (467 KB) when copying the driver.
Next, the Trojan creates a .dll file in the current folder where it is executed and then runs the following command:
regsvr32 /s [TROJAN FILE NAME].dll
Note: It has been reported that the file name could be mat[RANDOM NUMBER].dll.
It may then restart the compromised computer or display the following message:
Some updates require you to restart your computer to complete the update process. Be sure to save any work prior to the scheduled time.
When the computer restarts, the infected MBR will start the kernel loader located in sectors 60 and 61, which patches the Windows Kernel in memory to load the rootkit driver.
The rootkit driver then hooks the following kernel routines:
* IRP_MJ_READ
* IRP_MJ_WRITE
If sector 0 is read from hard disk, the Trojan will return the original MBR backup stored at sector 62. It will also try to block writing to sector 0, in order to prevent removal.
The Trojan also opens a back door, which attempts to bypass the local firewall and connect to the following location,allowing an attacker to control the compromised computer:
[http://]dkfhchkb.com/ser[REMOVED]
The Trojan may also inject additional code into usermode processes.
Affected
Windows 2000, Windows Server 2003, Windows Vista, Windows XP
Response
1. Restart the computer using the Windows Recovery Console.
2. Disable System Restore (Windows Me/XP).
3. Update the virus definitions.
4. Run a full system scan.
|
WebAttackNeosploitToolkitWebsite4
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects an attempt to download malicious files related to Trojan.Mebroot which may compromise the target host.
Additional Information
Trojan.Mebroot is a Trojan horse that overwrites the Master Boot Record of the hard disk and uses rootkit techniques to hide itself.
It has been reported that this threat may be installed from the following location using browser exploits:
[http://]gfeptwe.com[REMOVED]
When the Trojan is executed, it creates the following mutex so that only one instance of it is running on the compromised computer at any time:
Global\7BC8413E-DEF5-4BF6-9530-9EAD7F45338B
It then reads the Master Boot Record (MBR) and then scans the partition table to find the active boot partition of the computer.
The Trojan infects the MBR, copying the original MBR to sector 62 on the hard disk.
It then installs its own kernel loader to sectors 60 and 61 of the hard disk.
Next, it copies a rootkit driver near the end of the active boot partition. The Trojan overwrites around 1149 sectors (467 KB) when copying the driver.
Next, the Trojan creates a .dll file in the current folder where it is executed and then runs the following command:
regsvr32 /s [TROJAN FILE NAME].dll
Note: It has been reported that the file name could be mat[RANDOM NUMBER].dll.
It may then restart the compromised computer or display the following message:
Some updates require you to restart your computer to complete the update process. Be sure to save any work prior to the scheduled time.
When the computer restarts, the infected MBR will start the kernel loader located in sectors 60 and 61, which patches the Windows Kernel in memory to load the rootkit driver.
The rootkit driver then hooks the following kernel routines:
* IRP_MJ_READ
* IRP_MJ_WRITE
If sector 0 is read from hard disk, the Trojan will return the original MBR backup stored at sector 62. It will also try to block writing to sector 0, in order to prevent removal.
The Trojan also opens a back door, which attempts to bypass the local firewall and connect to the following location,allowing an attacker to control the compromised computer:
[http://]dkfhchkb.com/ser[REMOVED]
The Trojan may also inject additional code into usermode processes.
Affected
Windows 2000, Windows Server 2003, Windows Vista, Windows XP
Response
1. Restart the computer using the Windows Recovery Console.
2. Disable System Restore (Windows Me/XP).
3. Update the virus definitions.
4. Run a full system scan.
|
WebAttackNeosploitToolkitWebsite5
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
NeoSploit is a attack toolkit that allows the remote attacker to perform various malicious actions on the compromised computer.
Additional Information
NeoSploit is a attack toolkit that allows the remote attacker to perform various malicious actions on the compromised computer.
Affected
Various Platforms
Response
NA
|
WebAttackNeosploitToolkitWebsite6
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackNetgainEnterpriseManagerCommandInjection
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote command injection vulnerability in Netgarin Enterprise Manager.
Additional Information
A command injection vulnerability exists in Netgain Enterprise Manager that can lead to execution of arbitrary commands.
Affected
NetGain Enterprise Manager versions 7.2.562 build 853 and below.
Response
|
WebAttackNetgainEnterpriseManagerCVE-2017-16608
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote command injection vulnerability in Netgarin Enterprise Manager.
Additional Information
A command injection vulnerability exists in Netgain Enterprise Manager that can lead to execution of arbitrary commands.
Affected
NetGain Enterprise Manager versions 7.2.562 build 853 and below.
Response
|
WebAttackNetGearBufferOverflowAttack
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
The researcher has created a proof-of-concept to demonstrate these issues. Please see the references for more information.
Additional Information
Netgear WNR2000 is a router.
Netgear WNR2000 is prone to multiple security vulnerabilities:
1. An authentication-bypass vulnerability. Specifically, this issue affects the 'apply.cgi' script. [CVE-2016-10176]
2. An information disclosure vulnerability. Specifically, this issue occurs in 'apply_noauth.cgi' script. [CVE-2016-10175]
3. A stack-buffer overflow vulnerability. Specifically, this issue affects the 'apply.cgi' script. [CVE-2016-10174]
Note: This issue affects the WNR2000 version 5 routers when remote administration is enabled.
An attacker may leverage this issue to bypass the authentication mechanism and perform unauthorized actions, obtain sensitive information, or execute arbitrary code in the context of the affected application. Failed exploit attempts will likely cause a denial-of-service condition.
Netgear WNR2000 firmware version 5 is affected; other versions may also be affected.
Affected
NETGEAR WNR2000
|
WebattackNetGearFVS318CVE-2005-0291
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
NetGear FVS318 ProSafe VPN Firewall switch is a commercially available Firewall/VPN/Router hardware device.
Additional Information
NetGear FVS318 ProSafe VPN Firewall switch is a commercially available Firewall/VPN/Router hardware device.
NetGear FVS318 is reported prone to multiple vulnerabilities. These issues result from insufficient sanitization of user-supplied data and may allow an attacker to bypass URI filters and carry out cross-site scripting attacks.
The following issues were identified:
It is reported that an attacker can bypass URI filters of the device by using hexadecimal values in a URI. Apparently, the device fails to filter a potentially malicious URI when an equivalent URI containing hexadecimal values is supplied. This can allow an attacker to place potentially malicious files on a computer and carry out other attacks. This issue may also expose users of the product to unwanted malicious content.
The URI filter log viewer is reported prone to a cross-site scripting vulnerability. It is reported that the Web application does not filter HTML and script code when storing restricted links in a log file. This can allow an attacker to craft a malicious link and send it to a vulnerable device. When an administrator views the device logs the attacker-supplied script code may be executed in their browser. A successful attack can lead to theft of cookie-based authentication credentials and other attacks.
The research report specified that FVS318 devices with firmware 2.4 are vulnerable to these issues. FVS318 and FVS318v2 are shipped with firmware 2.4, however, it is possible that FVS318v3 and other firmware versions are affected as well. This BID will be updated when more information about affected packages is available.
Affected
NetGear FVS318 2.4
NetGear FVS318v2 2.4
Response
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] <mailto:[email protected]>.
|
WebAttackNetgearReadyNASSurveillanceRCE
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Netgear ReadyNAS Surveillance.
Additional Information
A critical vulnerability exists in Netgear ReadyNAS Surveillance configuration backup feature, that can lead to execution of arbitrary commands as root.
Affected
Netgear ReadyNAS Surveillance
Response
|
WebAttackNetgearRouterArbitraryFileAccess
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit various vulnerabilities in Netgear routers.
Additional Information
Various models of Netgear routers have multiple vulnerabilities that can allow Authentication ByPass, Information Disclosure, Remote Code Execution and Command Injection
Affected
Various Netgear routers.
|
Web Attack: Netgear Router Authentication Bypass
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit various vulnerabilities in Netgear routers.
Additional Information
Various models of Netgear routers have multiple vulnerabilities that can allow Authentication ByPass, Information Disclosure, Remote Code Execution and Command Injection
Affected
Various Netgear routers.
|
Web Attack: Netgear Router Command Execute 2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit various vulnerabilities in Netgear routers.
Additional Information
Various models of Netgear routers have multiple vulnerabilities that can allow Authentication ByPass, Information Disclosure, Remote Code Execution and Command Injection
Affected
Various Netgear routers.
|
Web Attack: Netgear Router Command Injection
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit various vulnerabilities in Netgear routers.
Additional Information
Various models of Netgear routers have multiple vulnerabilities that can allow Authentication ByPass, Information Disclosure, Remote Code Execution and Command Injection
Affected
Various Netgear routers.
|
WebAttackNetgearRouterHTTPDBufferOverflow
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit various vulnerabilities in Netgear routers.
Additional Information
Various models of Netgear routers have multiple vulnerabilities that can allow Authentication ByPass, Information Disclosure, Remote Code Execution and Command Injection
Affected
Various Netgear routers.
|
Web Attack: Netgear Router Remote Command Execute
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit various vulnerabilities in Netgear routers.
Additional Information
Various models of Netgear routers have multiple vulnerabilities that can allow Authentication ByPass, Information Disclosure, Remote Code Execution and Command Injection
Affected
Various Netgear routers.
|
WebAttackNetlinkGPONRouterRCE
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to exploit a remote code execution vulnerability in Netlink GPON routers.
Additional Information
Netlink GPON router suffers from a vulnerability that can lead to execution of arbitrary code.
Affected
Netlink GPON Router 1.0.11.
Response
|
WebAttackNetNTLMInfostealerWebsite
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to steal information through JavaScript/HTML code
Additional Information
A malicious javascript/HTML, which steals user's login credentials and NetNTLM Challenge/Response, is injected in clean website, so when a user visits the compromised website, injected script will also send this stolen information to a remote malicious user
Affected
Various Windows machines.
Response
|
Web Attack: Netscape Enterprise Server Directory Indexing CVE-2000-0236
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
This signature detects vulnerable HTTP parameters being sent to the Netscape HTTP server.
Additional Information
Netscape Enterprise Server 3.x includes a poorly documented feature that will allow remote users to view directory listings by appending various instructional tags to the URL. Although it can be disabled, Netscape Enterprise Server is shipped with the "Directory Indexing" feature enabled by default.
Affected
Netscape Enterprise Server 3.0, 3.6, 3.51
Response
The Directory Indexing feature can be turned off via the Administration Interface. Selecting Content Management -> Document Preferences and changing Directory Indexing to "none" will disable this feature.
Also, manually editing the file obj.conf will do the same. Conduct a search for the following:
Service method="(GET|HEAD)" type="magnus-internal/directory"nfn="index-common"
and replace fn="index-common" with fn="send-error".
Netscape Enterprise Server 3.0:
Netscape Patch SSL
iPlanet Patch DisRend
iPlanet Patch disrend.dll
Netscape Enterprise Server 3.6:
Netscape Patch SSL
iPlanet Patch DisRend
iPlanet Patch disrend.dll
Netscape Enterprise Server 3.51:
Netscape Patch SSL
|
Web Attack: Nette RCE Vulnerability CVE-2020-15227
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to exploit vulnerability on the affected machine.
Additional Information
Nette versions before 2.0.19, 2.1.13, 2.2.10, 2.3.14, 2.4.16, 3.0.6 are vulnerable to an code injection attack by passing specially formed parameters to URL that may possibly leading to RCE. Nette is a PHP/Composer MVC Framework.
Affected
Nette versions before 2.0.19, 2.1.13, 2.2.10, 2.3.14, 2.4.16, 3.0.6
Response
|
Web Attack: Network Weathermap Editor CVE-2013-2618
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit an arbitrary code execution vulnerability in the Network Weathermap Editor.
Additional Information
Network Weathermap is a network visualization tool.
Network Weathermap is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input submitted to the 'title field of the 'editor.php' script.
Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.
Affected
Network Weathermap 0.97a is vulnerable; other versions may also be affected.
|
WebAttackNeutrinoExploitKitDownload5
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from Neutrino toolkit that may compromise a computer through various vendor vulnerabilities.
Additional Information
Neutrino Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine.
Affected
This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities.
Response
Various Web Browsers
|
WebAttackNeutrinoExploitKitdownload9
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from Neutrino toolkit that may compromise a computer through various vendor vulnerabilities.
Additional Information
Neutrino Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine.
Affected
This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities.
Response
Various Web Browsers
|
WebAttackNeutrinoExploitKitRedirect
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer.
Additional Information
Microsoft Internet Explorer is prone to a remote code execution vulnerability that affects versions from 6-11.
Affected
Internet Explorer versions 6,7,8,9,10,11
|
WebAttackNeutrinoExploitKitRedirect2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from Neutrino toolkit that may compromise a computer through various vendor vulnerabilities.
Additional Information
Neutrino Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine.
Affected
This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities.
Response
Various Web Browsers
|
WebAttackNeutrinoExploitKitRedirect3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from Neutrino toolkit that may compromise a computer through various vendor vulnerabilities.
Additional Information
Neutrino Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine.
Affected
This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities.
Response
Various Web Browsers
|
WebAttackNeutrinoExploitKitRedirect4
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from Neutrino toolkit that may compromise a computer through various vendor vulnerabilities.
Additional Information
Neutrino Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine.
Affected
This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities.
Response
Various Web Browsers
|
WebAttackNeutrinoExploitKitRedirect5
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from Neutrino toolkit that may compromise a computer through various vendor vulnerabilities.
Additional Information
Neutrino Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine.
Affected
This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities.
Response
Various Web Browsers
|
WebAttackNeutrinoExploitKitRedirection
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from Neutrino toolkit that may compromise a computer through various vendor vulnerabilities.
Additional Information
Neutrino Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine.
Affected
This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities.
Response
Various Web Browsers
|
WebAttackNeutrinoExploitKitSWFDownload
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from Neutrino toolkit that may compromise a computer through various vendor vulnerabilities.
Additional Information
Neutrino Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine.
Affected
This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities.
Response
Various Web Browsers
|
Web Attack: Neutrino Exploit Kit Website 10
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from Neutrino toolkit that may compromise a computer through various vendor vulnerabilities.
Additional Information
Neutrino Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine.
Affected
This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities.
Response
Various Web Browsers
|
Web Attack: Neutrino Exploit Kit Website 2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from Neutrino toolkit that may compromise a computer through various vendor vulnerabilities.
Additional Information
Neutrino Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine.
Affected
This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities.
Response
Various Web Browsers
|
WebAttackNeutrinoExploitKitWebsite25
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from Neutrino toolkit that may compromise a computer through various vendor vulnerabilities.
Additional Information
Neutrino Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine.
Affected
This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities.
Response
Various Web Browsers
|
WebAttackNeutrinoExploitKitWebsite27
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from Neutrino toolkit that may compromise a computer through various vendor vulnerabilities.
Additional Information
Neutrino Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine.
Affected
This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities.
Response
Various Web Browsers
|
WebAttackNeutrinoExploitKitWebsite3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from Neutrino toolkit that may compromise a computer through various vendor vulnerabilities.
Additional Information
Neutrino Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine.
Affected
This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities.
Response
Various Web Browsers
|
WebAttackNeutrinoExploitKitWebsite4
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from Neutrino toolkit that may compromise a computer through various vendor vulnerabilities.
Additional Information
Neutrino Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine.
Affected
This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities.
Response
Various Web Browsers
|
Web Attack: Neutrino Exploit Kit Website 5
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from Neutrino toolkit that may compromise a computer through various vendor vulnerabilities.
Additional Information
Neutrino Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine.
Affected
This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities.
Response
Various Web Browsers
|
Web Attack: Next.JS Path Traversal Vulnerability CVE-2020-5284
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a directory traversal vulnerability in next.js.
Additional Information
Next.js is prone to a path traversal vulnerability that can lead to exposure of sensitive files.
Affected
Next.js versions below 9.3.2.
Response
|
Web Attack: Nginx Improper Path Normalization
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a path normalization vulnerability in nginx webserver.
Additional Information
A vulnerability exists in nginx webserver that can lead to exposure of sensitive local files stored outside the target on the webserver.
Affected
Various nginx webserver versions.
Response
|
Web Attack: NodeJS Systeminformation OS Command Injection CVE-2021-21315
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in NodeJS.
Additional Information
A vulnerability exists in NodeJS System Information Library that can lead to injection of OS commands.
Affected
Systeminformation library before version 5.3.1.
Response
|
WebattackNokiaelectronic
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
Nokia Electronic Documentation (NED) is a web-based documentation interface for
Nokia products.
Additional Information
Nokia Electronic Documentation (NED) is a web-based documentation interface for
Nokia products. NED is typically deployed on production networks for telecom operators.
A vulnerability has been discovered in Nokia Electronic Documentation (NED) that may allow an attacker to redirect connections to external systems. The problem likely occurs due to the NED server failing to sufficiently verify hosts provided within specific HTTP requests. Specifically, by making an HTTP request to NED that includes the 'action' and 'location' URI parameters, it is possible to carry out a specific action on a defined location.
As a result, an attacker may be capable of making a request that would cause data to be redirected to other systems. This may allow an attacker to interact with an otherwise inaccessible system, or potentially hide the origin of attacks launched against other targets.
Affected
Nokia Nokia Electronic Documentation 5.0
Response
It has been reported that the vendor will be addressing this issue in a forthcoming release (5.1), which is due at the beginning of 2004. This has not been confirmed by Symantec. Affected users should contact the vendor for further information.
|
WebattackNokiaElectronicDocumentation
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
Nokia Electronic Documentation (NED) is a web-based documentation interface for
Nokia products.
Additional Information
Nokia Electronic Documentation (NED) is a web-based documentation interface for
Nokia products. NED is typically deployed on production networks for telecom operators.
NED is prone to a vulnerability that may enable remote attackers to list directory contents for the web root directory. This issue may be exploited by appending a dot (.) to a request for a NED page. Exploitation will also have the side-effect of disclosing the path to the directory.
This issue could be exploited to gather information about the NED installation and the underlying file system, which could be useful in mounting further attacks against the system.
This issue was reported for NED installations hosted on WebLogic application servers. It is not known if NED is prone to the same behavior when hosted on other servers. It should be noted that although this vulnerability has been reported to affect Nokia Electronic Documentation version 5.0, previous versions might also be affected.
Affected
Nokia Nokia Electronic Documentation 5.0
Response
It has been reported that the vendor will be addressing this issue in a forthcoming release (5.1), which is due at the beginning of 2004. This has not been confirmed by Symantec. Affected users should contact the vendor for further information.
|
Web Attack: Nostromo Remote Code Execution
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to exploit vulnerability in nostromo.
Additional Information
Directory Traversal in the function http_verify in nostromo nhttpd through 1.9.6 allows an attacker to achieve remote code execution via a crafted HTTP request.
Affected
nostromo versions upto and including 1.9.6
Response
|
WebAttackNovellAssetManagementCVE-2011-2653
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Novell Zenworks Asset Management.
Additional Information
Novell ZENWorks Asset Management is used to manage IT assets in an organization.
ZENworks Asset Management is prone to a remote code-execution vulnerability because it fails to handle unauthenticated file upload processes in the 'rtrlet' component. Specifically, the application fails to properly sanitize the path for directory traversal sequences ('../') and the name of the file for NULL-byte characters.
An attacker can leverage this issue to upload an arbitrary file and place it in an arbitrary location on the affected system. Successful exploits will compromise the affected application, and the underlying system.
Affected
Novell ZENworks Asset Management 7.5
|
WebAttackNovellGroupwiseClientCVE-2012-0439
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a vulnerability in Novell Groupwise Client's ActiveX Control which may lead to remote code execution.
Additional Information
Novell GroupWise is collaboration software available for a number of platforms, including Linux and Microsoft Windows. Novell GroupWise Client allows users to access Novell services from remote computers.
Novell GroupWise is prone to a remote code-execution vulnerability that affects the unspecified ActiveX component.
Attackers can exploit this issue to execute arbitrary code within the context of the affected application that uses the ActiveX control (typically Internet Explorer). Failed exploit attempts will result in a denial-of-service condition.
Affected
Versions prior to GroupWise 8.0.3 Hot Patch 2
Versions prior to GroupWise 2012 SP1 Hot Patch 1
|
WebAttackNovellGroupwiseClientCVE-2012-04392
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a vulnerability in Novell Groupwise Client's ActiveX Control which may lead to remote code execution.
Additional Information
Novell GroupWise is collaboration software available for a number of platforms, including Linux and Microsoft Windows. Novell GroupWise Client allows users to access Novell services from remote computers.
Novell GroupWise is prone to a remote code-execution vulnerability that affects the unspecified ActiveX component.
Attackers can exploit this issue to execute arbitrary code within the context of the affected application that uses the ActiveX control (typically Internet Explorer). Failed exploit attempts will result in a denial-of-service condition.
Affected
Versions prior to GroupWise 8.0.3 Hot Patch 2
Versions prior to GroupWise 2012 SP1 Hot Patch 1
|
WebAttackNovellIManagerArbitraryFileUpload
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects Arbitrary file uploads in Novell iManager.
Additional Information
Novell iManager is a web-based management portal for various Novell products.
The application is prone to an arbitrary-file-upload vulnerability because it fails to properly sanitize user-supplied input. Specifically, this issue affects the 'getMultiPartParameters()' when validating uploaded files.
An attacker may leverage this issue to upload arbitrary files to the affected computer; this can result in arbitrary code execution within the context of the vulnerable application.
Novell iManager 2.7.3.2 and prior are vulnerable.
Affected
Novell iManager 2.7.3.2 and prior are vulnerable.
Response
Updates are available. Please see the references for details.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.