text
stringlengths
0
383k
WebAttackSuspiciousJarDownload5 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious JAR files. Additional Information Malicious website hosts JAR files which when executed on the machine may download additional malicious files and compromise the security of the machine. Affected Various platforms. Response
WebAttackSuspiciousJarDownload6 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious JAR files. Additional Information Malicious website hosts JAR files which when executed on the machine may download additional malicious files and compromise the security of the machine. Affected Various platforms. Response
Web Attack: Suspicious Jar Download 7 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious JAR files. Additional Information Malicious website hosts JAR files which when executed on the machine may download additional malicious files and compromise the security of the machine. Affected Various platforms. Response
WebAttackSuspiciousJarDownload8 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious JAR files. Additional Information Malicious website hosts JAR files which when executed on the machine may download additional malicious files and compromise the security of the machine. Affected Various platforms. Response
WebAttackSuspiciousJarDownload9 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious JAR files. Additional Information Malicious website hosts JAR files which when executed on the machine may download additional malicious files and compromise the security of the machine. Affected Various platforms. Response
WebAttackSuspiciousJavaDownload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackSuspiciousJavaDownload2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities. Additional Information Blackhole Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine. Affected Various Web Browsers Response No further action is required but you may wish to perform some of the following actions as a precautionary measure. • Update your product definitions and perform a full system scan. • Submit suspicious files to Symantec for analysis. If you believe that the signature is reported erroneously, please read the following: • Report a potential false positive to Symantec.
WebAttackSuspiciousPDFDownload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious executable download coming from browser in the form of javascript attacks. Additional Information The script tag can be used to specify any file. If an image file is specified, the server will deliver the script (named script.jpg), but with a content-type of image/jpeg. Affected Internet Explorer (all versions) Firefox (all versions) Response The following instructions pertain to all current and recent Symantec antivirus products, including the Symantec AntiVirus and Norton AntiVirus product lines. 1. Restart the computer using the Windows Recovery Console. 2. Disable System Restore (Windows Me/XP). 3. Update the virus definitions. 4. Run a full system scan.
Web Attack: Suspicious PHP URI location Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects PHP Brobot Activity in the system which can lead to compromised networks, file execution and data leakage of confidential information. Additional Information PHP Brobot is a php script that is usually uploaded to compromised webservers to allow more access to systems. When used, the malware author can then view directories, execute files in the system and potentially get confidential information from systems. Affected PHP servers
Web Attack: Suspicious Task Scheduler File Download Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to download suspicious task scheduler file on the affected machine. Additional Information Task Scheduler is a job scheduler in Microsoft Windows that launches computer programs or scripts at pre-defined times or after specified time intervals. Adversaries may download malicious task scheduler file on compromised machine to facilitate initial or recurring execution of malicious code. Affected Various Windows platforms Response
WebAttackSutraTDSRequest Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Toolkits contain various exploits bundled into a single package.Victim on visiting the server hosting the malicious toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various platforms
WebAttackSweetOrangeExploitKitWebsite Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackSweetOrangeExploitKitWebsite2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackSweetOrangeExploitKitWebsite20 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackSweetOrangeExploitKitWebsite22 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackSweetOrangeExploitKitWebsite6 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackSWFOSFingerprinting Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious SWF files that comes as part of standalone exploits or exploit toolkits. Additional Information SWF files can be used ancillary with exploits which helps the attackers to setup the shellcode in the higher memory addresses. Affected Various Web Browsers
WebAttackSWFXSSCVE-2011-2107 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a cross site request forgery vulnerability in Flash Player. Additional Information A Cross Site Request Forgery vulnerability exists in Flash Player that can allow SWF files to make HTTP requests onto arbitrary domains. Affected NA Response NA
Web Attack: Symantec AMS2 Intel Common Base Agent Remote Command Execution Vulnerability Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempt to exploit a remote code execution vulnerability by sending specially crafted packets to port 12174 Additional Information Symantec AMS2 (Alert Management Systems 2) is an optional component for a number of Symantec security products. The Intel LANDesk Common Base Agent (CBA) component of AMS2 is prone to a vulnerability that attackers can leverage to execute arbitrary commands. This issue occurs because the software fails to sufficiently sanitize user-supplied data submitted as a TCP packet on port 12174 before passing it as a parameter to a 'CreateProcessA()' function call. Successfully exploiting this issue will allow an attacker to execute arbitrary commands with SYSTEM-level privileges, completely compromising affected computers. Failed exploit attempts will result in a denial-of-service condition. Response The vendor has released an advisory and updates. Please see the references for details.
WebAttackSymantecAppstreamCVE-2008-4388 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description Attackers may exploit this issue to execute arbitrary code within the context of the affected application that uses the ActiveX control. Additional Information Symantec AppStream Client is an application that allows users to deploy and manage application licenses. AppStream Client is prone to a vulnerability that can allow malicious files to be downloaded and saved to arbitrary locations on an affected computer. This issue occurs because the application fails to validate user-supplied data. The vulnerability affects the 'installAppMgr()' method of the LaunchObj' ActiveX control identified by CLSID: 3356DB7C-58A7-11D4-AA5C-006097314BF8. Attackers may exploit this issue to put malicious files in arbitrary locations and execute these files within the context of the affected application that uses the affected control (typically Internet Explorer). Other attacks are also possible. Affected The vendor released an update to address this issue. Please see the references for more information.
Web Attack: Symantec Endpoint Manager CVE-2015-1486 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit multiple security bypass vulnerability in Symantec Endpoint Protection and Symantec Endpoint Protection Manager. Additional Information SEP/SEPM is prone to a multiple vulnerabilities which includes - authentication bypass, arbitrary read/write, SQL injection, path traversal. Affected SEP/SEPM
Web Attack: Symantec Endpoint Manager CVE-2015-1487 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit an arbitrary file write vulnerability in Symantec Endpoint Protection Manager. Additional Information Symantec Endpoint Protection (SEP) Manager is a security application. Symantec Endpoint Protection Manager is prone to a vulnerability that let attackers write or overwrite arbitrary files. Specifically, this issue occurs because it fails to properly validate the file name in a console session. An authorized SEPM user can exploit this issue to write arbitrary files in the context of the corresponding user. An attacker can exploit this issue to write or overwrite arbitrary files in the context of the web server, which may aid in further attacks. Affected Symantec Endpoint Protection (SEP) Manager
WebAttackSymantecEndpointManagerRCE Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Symantec Endpoint Manager. Additional Information Symantec Endpoint Protection (SEP) is a security application. Symantec Endpoint Protection (SEP) Manager is prone to a remote code-execution vulnerability because it fails to properly validate user-supplied input. Affected Symantec Endpoint Protection Manager - version:12.1.2015.2015
WebAttackSymantecEndpointManagerSQLi Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Symantec Endpoint Manager. Additional Information Symantec Endpoint Protection (SEP) is a security application. Symantec Endpoint Protection (SEP) Manager is prone to a remote code-execution vulnerability because it fails to properly validate user-supplied input. Affected Symantec Endpoint Protection Manager - version:12.1.2015.2015
WebAttackSymantecEndpointManagerXSS Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Symantec Endpoint Manager. Additional Information Symantec Endpoint Protection (SEP) is a security application. Symantec Endpoint Protection (SEP) Manager is prone to a remote code-execution vulnerability because it fails to properly validate user-supplied input. Affected Symantec Endpoint Protection Manager - version:12.1.2015.2015
WebAttackSymantecEndpointManagerXSSAttempt Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a XSS vulnerability in Symantec Endpoint Manager. Additional Information SEPM suffers from a Cross Site Scripting vulnerability that can lead to execution of malicious scripts. Affected Symantec Endpoint Manager. Response
Web Attack: Symantec Endpoint Manager XXE Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Symantec Endpoint Manager. Additional Information Symantec Endpoint Protection (SEP) is a security application. Symantec Endpoint Protection (SEP) Manager is prone to a remote code-execution vulnerability because it fails to properly validate user-supplied input. Affected Symantec Endpoint Protection Manager - version:12.1.2015.2015
Web Attack: Symantec Endpoint Manager XXE 2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Symantec Endpoint Manager. Additional Information Symantec Endpoint Protection (SEP) is a security application. Symantec Endpoint Protection (SEP) Manager is prone to a remote code-execution vulnerability because it fails to properly validate user-supplied input. Affected Symantec Endpoint Protection Manager - version:12.1.2015.2015
WebAttackSymantecLiveUpdateAdministratorSQLInjectionVulnerability Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attemps to exploit to symantec liveupdate administrator CSRF vulnerability Additional Information The Symantec LiveUpdate Administrator is an enterprise Web application that allows you to manage Symantec updates on multiple internal Central LiveUpdate servers, called Distribution Centers. Using the Symantec LiveUpdate Administrator, you download updates to the Manage Updates folder, and then publish the updates to production distribution servers for LiveUpdate clients to download, or to testing distribution centers, so that the updates can be tested before they are published to production. The webfrontend do not properly sanitize some variables before being returned to the user. If an attacker supplies a username, containing scriptcode, at the login-page of the service, an entry in the Event Log is done, containing the "username". If the admin user is viewing the logfile, the scriptcode will be executed. Affected Symantec LiveUpdate Administrator
WebAttackSymantecMessagingGateway Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects exploit attempts on Symantec Messaging Gateway. Additional Information Symantec Messaging Gateway 9.5.3-3 is vulnerable to 1. XSS (both reflective and stored) with session-hijacking 2. Easy CSRF to add a backdoor-administrator. 3. Unauthenticated detailed version disclosure. 4. Arbitrary file download is possible with a crafted URL (authenticated) 5. SSH with backdoor user account + privilege escalation to root due to very old Kernel 6. Out-of-band stored-XSS -delivered by email. 7. Ability for an authenticated attacker to modify the Web-application (as root) Affected Symantec Messaging Gateway 9.5.3-3
WebAttackSymantecMessagingGateway2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects exploit attempts on Symantec Messaging Gateway. Additional Information Symantec Messaging Gateway 9.5.3-3 is vulnerable to 1. XSS (both reflective and stored) with session-hijacking 2. Easy CSRF to add a backdoor-administrator. 3. Unauthenticated detailed version disclosure. 4. Arbitrary file download is possible with a crafted URL (authenticated) 5. SSH with backdoor user account + privilege escalation to root due to very old Kernel 6. Out-of-band stored-XSS -delivered by email. 7. Ability for an authenticated attacker to modify the Web-application (as root) Affected Symantec Messaging Gateway 9.5.3-3
WebAttackSymantecMessagingGatewayCVE-2016-5312 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a directory traversal vulnerability in Symantec Messaging Gateway. Additional Information Symantec Messaging Gateway is an appliance used to filter and scan content. Symantec Messaging Gateway is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input. Specifically, this issue affects the charting component. An attacker can exploit this issue by sending a specially-crafted URL request to view arbitrary files on the system. An attackers can use specially crafted requests with directory-traversal sequences ('../') to read arbitrary files in the context of the application. This may aid in further attacks. Versions prior to Symantec Messaging Gateway Appliance 10.6.2 are vulnerable. Affected Versions prior to Symantec Messaging Gateway Appliance 10.6.2 are vulnerable.
WebAttackSymantecMessagingGatewayCVE-2017-63262 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description An attacker can leverage this issue to execute arbitrary code on the affected system. Additional Information Symantec Messaging Gateway is an appliance used to filter and scan content. Symantec Messaging Gateway is prone to an unspecified remote code-execution vulnerability. An attacker can exploit this issue to execute arbitrary commands on the target system. Attackers can exploit this issue to execute arbitrary code on the affected system. Affected Versions prior to Symantec Messaging Gateway 10.6.3-266 are vulnerable.
WebAttackSymantecMessagingGatewayCVE-2017-6327 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description An attacker can leverage this issue to execute arbitrary code on the affected system. Additional Information Symantec Messaging Gateway is an appliance used to filter and scan content. Symantec Messaging Gateway is prone to an unspecified remote code-execution vulnerability. An attacker can exploit this issue to execute arbitrary commands on the target system. Attackers can exploit this issue to execute arbitrary code on the affected system. Affected Versions prior to Symantec Messaging Gateway 10.6.3-266 are vulnerable.
WebAttackSymantecSEDRCrossSiteScripting Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit Cross Site Scripting Vulnerability on the affected machine. Additional Information Symantec Endpoint Detection and Response is vulnerable to Cross Site Scripting attack. An attacker can exploit this issue by enticing an unsuspecting user to follow a specially crafted link. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. Affected Various versions of SEDR. Response
WebAttackSymantecSEPMCrossSiteScripting Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit Cross Site Scripting vulnerability on the affected machine. Additional Information Symantec Endpoint Protection Manager is vulnerable to Cross Site Scripting attack. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. Affected Various versions of SEPM. Response
Web Attack: Symantec Web Gateway CVE-2012-0299 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a file upload vulnerability in Symantec Web Gateway Additional Information Symantec Web Gateway is a web security gateway appliance. The application is prone to an arbitrary file-upload vulnerability due to a failure to properly sanitize user-supplied input. The problem affects the management scripts, and can be exploited to upload a file with an arbitrary name and to an arbitrary location on the affected system. Successful exploits will result in attacker-supplied code executing in the context of the affected application. Affected Symantec Web Gateway 5.0.1 Symantec Web Gateway 5.0 Response Vendor updates are available. Please see the references for more information.
WebAttackSymantecWebGatewayCVE-2012-2953 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a file upload vulnerability in Symantec Web Gateway Additional Information Symantec Web Gateway is a web security gateway appliance. The application is prone to an arbitrary file-upload vulnerability due to a failure to properly sanitize user-supplied input. The problem affects the management scripts, and can be exploited to upload a file with an arbitrary name and to an arbitrary location on the affected system. Successful exploits will result in attacker-supplied code executing in the context of the affected application. Affected Symantec Web Gateway 5.0.1 Symantec Web Gateway 5.0 Response Vendor updates are available. Please see the references for more information.
WebAttackSymantecWebGatewayRemoteCodeExecution Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit Remote Command Execution vulnerability on the affected machines. Additional Information Symantec Web Gateway is a Web security gateway appliance. Symantec Web Gateway is prone to a remote-code execution vulnerability. Note: To exploit this issue, an 'uploads' folder with 'writable' permission should exist in target host. An attacker may leverage this issue to execute arbitrary code in the context of the affected application. Affected Symantec Web Gateway version 5.0.2.8 is vulnerable. Response Currently, we are not aware of any vendor-supplied patches. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].
Web Attack: Symantec Web Gateway Remote Code Execution 2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit Remote Command Execution vulnerability on the affected machines. Additional Information Symantec Web Gateway is a Web security gateway appliance. Symantec Web Gateway is prone to a remote-code execution vulnerability. Note: To exploit this issue, an 'uploads' folder with 'writable' permission should exist in target host. An attacker may leverage this issue to execute arbitrary code in the context of the affected application. Affected Symantec Web Gateway version 5.0.2.8 is vulnerable. Response Currently, we are not aware of any vendor-supplied patches. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].
WebAttackSymantecWebGatewayXSS Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a Cross Site Scripting vulnerability in Symantec Web Gateway. Additional Information Symantec Web Gateway is a web security gateway appliance. Symantec Web Gateway is prone to a vulnerability that lets attackers inject arbitrary code into certain application scripts. Specifically, the issue affects the management interface. An attacker can exploit this issue to inject and execute arbitrary code in the context of the affected application. This may facilitate a compromise of the application and the underlying system; other attacks are also possible. Affected Symantec Web Gateway
WebAttackSymantecWorkspaceCVE-2014-1649 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts of leveraging an unauthorized-access vulnerability in Symantec Workspace Streaming (formerly Symantec AppStream) which could lead to uploading arbitrary file. Additional Information Symantec Workspace Streaming (formerly Symantec AppStream) is an application package which aids in distributing software. It contains both client and server components. Symantec Workspace Streaming is prone to an unauthorized-access vulnerability because it fails to properly handle incoming 'XMLRPC' requests. Attackers can exploit this issue be sending a specially crafted 'XMLRPC' request. Successful exploits will allow attackers to create a backdoor on the targeted server resulting in unauthorized privileged access. Affected Symantec Workspace Streaming 7.5.x and prior are vulnerable.
WebAttackSymantecWorkspaceStreamingXMLRPCRCE Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a XMLRPC request remote code execution vulnerability in Symantec Workspace Streaming Server. Additional Information Symantec Workspace Streaming (formerly Symantec AppStream) is an application package which aids in distributing software. It contains both client and server components. Affected Symantec Workspace Streaming 7.5.0.493
Web Attack: Symmetricom SyncServer CVE-2022-40022 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to Command Injection vulnerability on the affected machine. Additional Information Symmetricom SyncServer is vulnerable to Command Injection attack. Successfully exploiting these issues will allow attackers to execute arbitrary code within the context of the application. Affected Microchip Technology (Microsemi) SyncServer S650 Response
WebAttackSynactisPDFIn-The-BoxActiveXControlBO Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a buffer overflow vulnerability in PDF In-The-Box Active X Control which could result in remote code execution. Additional Information The PDF In-The-Box ActiveX Control (PDF_In_The_Box.ocx) is a development tool for creating PDF files programmatically. Logic Print 2013 is a professional application designed to estimate the costs of printing for printing businesses. The PDF In-The-Box ActiveX Control for Logic Print 2013 is prone to a remote stack-based buffer-overflow vulnerability. Specifically, this issue occurs when handling the 'aPageRef' argument passed to the 'ConnectToSynactis()' method. An attacker can exploit this issue by sending an overly long string. Successful exploits allow remote attackers to execute arbitrary code in the context of the vulnerable application. Failed exploit attempts will likely result in denial-of-service conditions. Affected PDF In-The-Box ActiveX 1.2.0.0 is vulnerable; other versions may also be affected. Response
WebAttackSynologyDiskStationManagerCVE-2017-15889 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit remote command execution vulnerability on the affected machine. Additional Information Synology DiskStation Manager (DSM) is a Linux based operating system. Synology DiskStation Manager is prone to a remote command-execution vulnerability because it fails to properly sanitize user-supplied input submitted to the 'webman/modules/StorageManager/smart.cgi' script. An attacker can exploit this issue to execute arbitrary commands with root privileges after website authentication. Affected Synology DiskStation Manager prior to version 5.2-5967-5. Response
WebAttackSysAidHelpDeskCVE-2015-2995 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects multiple security vulnerabilities in SysAid Help Desk software solution. Additional Information SysAid is a Help Desk software solution that integrates all the essential IT tools into one Service Desk. SysAid is prone to following security vulnerabilities: 1. A security-bypass vulnerability exists because it allows the creation of administrator account. [CVE-2015-2993] 2. An arbitrary file-write vulnerability exists that affects the 'fileName' parameter of the '/sysaid/userentry' page. [CVE-2015-2993] 3. An arbitrary file-upload vulnerability exists that affects the '/sysaid/ChangePhoto.jsp' page. Attackers can exploit this issue to upload files to arbitrary locations through directory traversal sequences. [CVE-2015-2994] 4. An arbitrary file-upload vulnerability exists that affects the 'rdsName' parameter of the '/sysaid/rdslogs' page. Attackers can exploit this issue to upload files to arbitrary locations through directory traversal sequences. [CVE-2015-2995] 5. An arbitrary file-download vulnerability exists that affects the 'fileName' parameter of the '/sysaid/getGfiUpgradeFile' page. [CVE-2015-2996] 6. A denial-of-service vulnerability exists that affects the 'fileName' parameter of the '/sysaid/calculateRdsFileChecksum' page. [CVE-2015-2996] 7. A path disclosure vulnerability exists that affects the 'accountId' parameter of the '/sysaid/getAgentLogFile' page. [CVE-2015-2997] 8. Multiple SQL-injection vulnerabilities exist that affect the following pages and parameters: '/sysaid/genericreport' : 'groupFilter', 'customSQL' '/sysaid/HelpDesk.jsp' : 'dir' '/sysaid/RFCGantt.jsp' : 'listName' [CVE-2015-2999] 9. Multiple XML External Entity injection vulnerabilities exist that affect the '/sysaid/agententry', '/sysaid/rdsmonitoringresponse' and '/sysaid/androidactions' pages. [CVE-2015-3000] Attackers can exploit these issues to upload, write, or download arbitrary files; cause a denial-of-service; disclose sensitive information; bypass security restrictions; compromise the application, access or modify data, or exploit latent vulnerabilities in the context of the affected application. Other attacks may also be possible. Affected SysAid Help Desk prior to version 15.2
Web Attack: SysAid Path Traversal CVE-2023-47246 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit path traversal vulnerability in SysAid. Additional Information In SysAid On-Premise before 23.3.36, a path traversal vulnerability leads to code execution after an attacker writes a file to the Tomcat webroot, as exploited in the wild in November 2023. Affected SysAid before 23.3.36 Response
WebAttackSysscanScannerRequest Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Masscan scans on the machine. Additional Information Masscan is a scanning tool that scans and alerts on vulnerabilities found on remote machines. Affected Various Platforms. Response
WebAttackTDSSDownloaderRequest Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description TDSS Downloader Activity allows malicious user to perform various malicious actions on the compromised computer. Additional Information TDSS is a trojan that has a rootkit component and a bot component. The rootkit is responsible for hiding the trojan's files on disk, and for providing hidden and encrypted storage for the bot component. The bot component connects to remote computers and makes the infected computer part of a botnet. It may download and install additional malware. Affected Windows 98, Windows 95, Windows XP, Windows Me, Windows Vista, Windows NT, Windows Server 2003, Windows 2000 Response The following instructions pertain to all current and recent Symantec antivirus products, including the Symantec AntiVirus and Norton AntiVirus product lines. 1. Disable System Restore (Windows Me/XP). 2. Update the virus definitions. 3. Run a full system scan. 4. Delete any values added to the registry.
Web Attack: TeamCity Authentication Bypass CVE-2023-42793 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit authentication bypass vulnerability in TeamCity. Additional Information In JetBrains TeamCity before 2023.05.4 authentication bypass leading to RCE on TeamCity Server was possible. An unauthenticated attacker who has HTTP(S) access to a TeamCity server can exploit this vulnerability to launch a remote code execution (RCE) attack, ultimately gaining complete administrative control over the server. Affected JetBrains TeamCity before 2023.05.4 Response
WebAttackTechnoteRemoteFileInclusionCVE-2009-0441 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote file inclusion vulnerability in Technote. Additional Information Technote is a PHP-based web application. The application is prone to a remote file-include vulnerability because it fails to sufficiently sanitize user-supplied input to the 'shop_this_skin_path' parameter of the 'skin_shop/standard/2_view_body/body_default.php' script. An attacker can exploit this issue to execute malicious PHP code in the context of the webserver process. This may allow the attacker to compromise the application and the underlying computer; other attacks are also possible. Affected Technote 7.2 is vulnerable; other versions may also be affected.
Web Attack: Telerik UI Arbitrary File Upload CVE-2017-11317 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit an arbitrary file upload vulnerability in Telerik UI. Additional Information Telerik UI for ASP.NET AJAX is prone to an arbitrary file-upload vulnerability. Specifically, this issue occurs due to weak 'RadAsyncUpload' encryption in 'Telerik.Web.UI'. An attacker can exploit this issue to perform arbitrary file uploads or execute arbitrary code. An attacker may leverage this issue to upload arbitrary files to the affected computer; this can result in arbitrary code execution within the context of the vulnerable application or privilege escalation. Affected Versions prior to Telerik UI for ASP.NET AJAX 2017.2.711 and 2017.1.118 are vulnerable.
Web Attack: Telerik UI CVE-2019-18935 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit remote code execution vulnerability on the affected machine. Additional Information Progress Telerik UI for ASP.NET AJAX through 2019.3.1023 contains a .NET deserialization vulnerability in the RadAsyncUpload function. This is exploitable when the encryption keys are known due to the presence of CVE-2017-11317 or CVE-2017-11357, or other means. Exploitation can result in remote code execution. Affected Progress Telerik UI for ASP.NET AJAX through 2019.3.1023. (As of 2020.1.114, a default setting prevents the exploit. In 2019.3.1023, but not earlier versions, a non-default setting can prevent exploitation.) Response
Web Attack: Telerik UI CVE-2019-18935 2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit remote code execution vulnerability on the affected machine. Additional Information Progress Telerik UI for ASP.NET AJAX through 2019.3.1023 contains a .NET deserialization vulnerability in the RadAsyncUpload function. This is exploitable when the encryption keys are known due to the presence of CVE-2017-11317 or CVE-2017-11357, or other means. Exploitation can result in remote code execution. Affected Progress Telerik UI for ASP.NET AJAX through 2019.3.1023. (As of 2020.1.114, a default setting prevents the exploit. In 2019.3.1023, but not earlier versions, a non-default setting can prevent exploitation.) Response
WebAttackTendaAC15AC1900CVE-2020-10987 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit various vulnerabilities in Tenda AC15 AC1900. Additional Information Multiple vulnerabilities exists in Tenda AC15 AC1900 that are effected by Insufficient Request Validation, Insufficient Data Validation and Sanitization, Hardcoded Credentials. Affected Tenda AC15 AC1900 Smart Dual-band Gigabit Wi-Fi Router. Response
WebAttackTendaAC15AC1900CVE-2020-10989 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit various vulnerabilities in Tenda AC15 AC1900. Additional Information Multiple vulnerabilities exists in Tenda AC15 AC1900 that are effected by Insufficient Request Validation, Insufficient Data Validation and Sanitization, Hardcoded Credentials. Affected Tenda AC15 AC1900 Smart Dual-band Gigabit Wi-Fi Router. Response
WebAttackTendaAC15AC1900CVE-2020-15916 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit various vulnerabilities in Tenda AC15 AC1900. Additional Information Multiple vulnerabilities exists in Tenda AC15 AC1900 that are effected by Insufficient Request Validation, Insufficient Data Validation and Sanitization, Hardcoded Credentials. Affected Tenda AC15 AC1900 Smart Dual-band Gigabit Wi-Fi Router. Response
WebAttackTendaAC15AC1900ShellUpload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit various vulnerabilities in Tenda AC15 AC1900. Additional Information Multiple vulnerabilities exists in Tenda AC15 AC1900 that are effected by Insufficient Request Validation, Insufficient Data Validation and Sanitization, Hardcoded Credentials. Affected Tenda AC15 AC1900 Smart Dual-band Gigabit Wi-Fi Router. Response
Web Attack: Tenda Router RCE CVE-2020-10987 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempts to exploit a remote code execution vulnerability in Tenda router. Additional Information A vulnerability exists in Tenda router that can lead to execution of arbitrary code. Affected Tenda AC15 AC1900 version 15.03.05.19. Response
Web Attack: TerraMaster TOS RCE CVE-2020-28188 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in TerraMaster TOS. Additional Information A vulnerability exists in TerraMaster TOS that can lead to execution of arbitrary code. Affected TerraMaster TOS version less than and including 4.2.06. Response
WebAttackTerrasMasterNASCmdInjectionCVE-2018-13354 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an unauthenticated command injection vulnerability in TerrasMaster NAS devices. Additional Information TerraMaster NAS device is prone to a vulnerability that allows unauthenticated command injections that can lead to compromise of the device. Affected TerraMaster NAS devices. Response
WebAttackTerrorExploitKit Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites. Additional Information This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers Affected Various compromised sites
WebAttackTerrorExploitKitSWFDownload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Adobe Flash files which may contain malicious code exploiting a vulnerability. Additional Information Adobe Flash file format used for multimedia, vector graphics and ActionScript. SWF files can contain animations or applets of varying degrees of interactivity and function. Affected Adobe Flash
WebAttackTerrorExploitKitSWFDownload2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Adobe Flash files which may contain malicious code exploiting a vulnerability. Additional Information Adobe Flash file format used for multimedia, vector graphics and ActionScript. SWF files can contain animations or applets of varying degrees of interactivity and function. Affected Adobe Flash
Web Attack: Test-CGI Directory Listing CVE-1999-0070 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description This signature detects attempts to access the Sample Test CGI program through HTTP. Additional Information NCSA HTTPd and comes with a CGI sample shell script, test-cgi, located by default in /cgi-bin. This script does not properly enclose an "ECHO" command in quotes, and as a result "shell expansion" of the * character can occur under some configurations. This allows a remote attacker to obtain file listings, by passing *, /*, /usr/* etc., as variables. The ECHO command expands the * to give a directory listing of the specified directory. This could be used to gain information to facilitate future attacks. This is identical to a problem with another sample script, nph-test-cgi. See references. Affected Apache Software Foundation Apache 0.8.11, 0.8.14, 1.0, 1.0.2, 1.0.3, 1.0.5 NCSA httpd 1.3, 1.4, 1.4.1, 1.4.2, 1.5 a-export, 1.5.1, 1.5.2, 1.5.2 a Response Locating and auditing of the client and server is recommended. Also disable the test scripts on the server.
Web Attack: ThinkCMF Remote Code Execution Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit vulnerability on the affected machine. Additional Information MACHINE is vulnerable to EXPLOIT attack. Successfully exploiting these issues will allow attackers to execute arbitrary code within the context of the application. Affected Various Windows machines. Response
Web Attack: ThinkPHP getShell Remote Code Execution Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in ThinkPHP. Additional Information ThinkPHP contains a vulnerability in getshell that can lead to execution of remote code. Affected ThinkPHP versions 5.0 and 5.1. Response
WebAttackThinkPHPgetShellRemoteCodeExecution3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in ThinkPHP. Additional Information ThinkPHP contains a vulnerability in getshell that can lead to execution of remote code. Affected ThinkPHP versions 5.0 and 5.1. Response
WebAttackTimthumbArbitraryFileUploadCVE-2011-4106 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit an arbitrary file upload vulnerability in Wordpress Timthumb plugin. Additional Information WordPress is a PHP-based content manager. Timthumb is a plugin for WordPress. The application is prone to a vulnerability that lets attackers upload arbitrary files. The issue occurs because the application stores uploaded files in a Web accessible temporary cache directory. Also, the application fails to properly validate permitted domains for uploaded files. An attacker can exploit this issue to upload arbitrary PHP code and run it in the context of the Web server process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible. Affected Versions prior to Timthumb 1.34 are vulnerable.
Web Attack: Tongda OA Arbitrary File Upload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempts to exploit an arbitrary file upload vulnerability in Tongda Office Anywhere. Additional Information Tongda Office Anywhere is vulnerable to an arbitrary file upload vulnerability that can lead to compromise of the device its running on. Affected Tongda Office Anywhere. Response
WebAttacktoStaticHTMLMethodCVE-2011-1973 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a information disclosure vulnerability in the toStaticHTML API. Additional Information An information disclosure vulnerability exists in toStaticHTML API that could allow the attackers to run scripts. Affected NA Response NA
WebAttackTOTOLINKRouterCommandInjectionCVE-2021-43711 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit Command Injection vulnerability in TOTOLINK Router Models Additional Information The downloadFlile.cgi binary file in TOTOLINK has a command injection vulnerability when receiving GET parameters. The parameter name can be constructed for unauthenticated command execution. Affected Various TOTOLINK Router models. Response
Web Attack: TOTOLINK Router Command Injection CVE-2022-26186 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit Command Injection vulnerability in TOTOLINK Router Models Additional Information TOTOLINK N600R V4.3.0cu.7570_B20200620 was discovered to contain a command injection vulnerability via the exportOvpn interface at cstecgi.cgi. Affected Various TOTOLINK Router models. Response
WebAttackTOTOLINKRouterCommandInjectionCVE-2022-26210 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit Command Injection vulnerability in TOTOLINK Router Models Additional Information Totolink A830R V5.9c.4729_B20191112, A3100R V4.1.2cu.5050_B20200504, A950RG V4.1.2cu.5161_B20200903, A800R V4.1.2cu.5137_B20200730, A3000RU V5.9c.5185_B20201128, and A810R V4.1.2cu.5182_B20201026 were discovered to contain a command injection vulnerability in the function setUpgradeFW, via the FileName parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request. Affected Various TOTOLINK Router models. Response
Web Attack: TOTOLINK Router Command Injection CVE-2022-38511 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit Command Injection vulnerability in TOTOLINK Router Models Additional Information The downloadFlile.cgi binary file in TOTOLINK has a command injection vulnerability when receiving GET parameters. The parameter name can be constructed for unauthenticated command execution. Affected Various TOTOLINK Router models. Response
Web Attack: TOTOLINK Router RCE Attempt Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempts to exploit an Remote Code Execution vulnerability in TOTOLINK Router Models. Additional Information A hidden form in the latest firmware allows an attacker to execute commands as root by sending a HTTP request. Affected Various Windows machines. Response
WebAttackTP-LinkTL-WA850REWifiExtenderRCE Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit various vulnerabilities in TP-Link routers. Additional Information TP-Link router are prone to various vulnerabilities that can lead to compromise of the device. Affected TP-Link routers. Response
WebAttackTPLinkRouterCSRFCVE-2013-2645 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a cross site request forgery vulnerability in TP-LINK Router. Additional Information TP-Link TL-WR1043N is a router. The device is prone to a cross-site request-forgery vulnerability because the application does not properly validate HTTP requests. Attackers can exploit this issue to change the login credentials when a logged-in user visits a specially crafted web page. Attackers can exploit this issue to perform certain administrative actions and to gain unauthorized access to the affected device. Affected TP-Link TL-WR1043N
WebAttackTrafficBrokerReconnaissance Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects traffic broker activity which be used to determine if certain advertisers are strictly malicious or are just housing a mixture of clean and dirty traffic. Additional Information Traffic brokers are the middlemen when redirecting traffic from one site to another. While not necessarily malicious, there are instances where users can redirect a user to a malicious site. Affected Browsers
WebAttackTRENDnetSecurViewCVE-2012-4876 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an attempt to exploit a buffer overflow vulnerability in TRENDnet SecurView which may result in remote code execution or denial-of-service conditions. Additional Information TRENDnet TV-IP121WN is a wireless security camera. TV-IP121WN is prone to a stack-based buffer overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it into an insufficiently sized memory buffer. Specifically, this issue affects the 'OpenFileDlg()' method due to an insecure 'WideCharToMultiByte()' call inside 'UltraMJCamX.ocx' ActiveX control identified by the following CLSID: 707ABFC2-1D27-4a10-A6E4-6BE6BDF9FB11 An attacker can exploit this issue to execute arbitrary code within the context of the application, typically Internet Explorer, that uses the ActiveX control. Failed exploit attempts will result in denial-of-service conditions. Affected TRENDnet SecurView TV-IP121WN
WebAttackTRENDnetSecurViewCVE-2012-48762 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an attempt to exploit a buffer overflow vulnerability in TRENDnet SecurView which may result in remote code execution or denial-of-service conditions. Additional Information TRENDnet TV-IP121WN is a wireless security camera. TV-IP121WN is prone to a stack-based buffer overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it into an insufficiently sized memory buffer. Specifically, this issue affects the 'OpenFileDlg()' method due to an insecure 'WideCharToMultiByte()' call inside 'UltraMJCamX.ocx' ActiveX control identified by the following CLSID: 707ABFC2-1D27-4a10-A6E4-6BE6BDF9FB11 An attacker can exploit this issue to execute arbitrary code within the context of the application, typically Internet Explorer, that uses the ActiveX control. Failed exploit attempts will result in denial-of-service conditions. Affected TRENDnet SecurView TV-IP121WN
WebAttackTrojan.BackdoorActivity224 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Backdoor Trojan activity on the compromised computer. Additional Information Backdoor Trojans allow the remote attackers to perform various malicious activities on the compromised machine. Affected Various Windows platforms
WebAttackTrojan.Brisv.AFileDownload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects activities of Trojan.Brisv.A which redirects the client to a malicious link which may download files that could compromise the target computer. Additional Information Trojan.Brisv.A is a Trojan horse that infects media files which may cause Windows Media Player to access a malicious URL. The Trojan horse searches the compromised computer for .asf, .mp2, .mp3, .wma and .wmv files, which it then infects. When opened in Windows Media Player the infected files cause the program to connect to a malicious URL which may result in more malware being downloaded on to the compromised computer. Infected media files may be downloaded on to the computer through file-sharing programs. Files infected with Trojan.Brisv.A are detected as Trojan.Brisv.A!inf. Symantec recommends downloading and running the Trojan.Brisv.A!inf Removal Tool to disinfect the affected media files. Once executed, the Trojan creates the following registry subkey: HKEY_CURRENT_USER\Software\Microsoft\PIMSRV It modifies the following registry entries: * HKEY_CURRENT_USER\Software\Microsoft\MediaPlayer\Preferences\"URLAndExitCommandsEnabled" = "0" * HKEY_CURRENT_USER\Software\Microsoft\MediaPlayer\Player\Extensions\.mp3\"Permissions" = "21" It creates the following mutex so that only one Trojan instance is running in memory: PIMSRV1 It searches for multimedia files with the following extensions: * .asf * .mp2 * .mp3 * .wma * .wmv It searches for and converts the following files to the WMA format: * .mp2 * .mp3 It injects functionality into the multimedia files it finds causing Windows Media Player to access a malicious link when the media player opens the infected file. The infected files are increased 1,138 bytes in size and are detected as Trojan.Brisv.A!inf. Affected Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, Windows Vista, Windows XP Response The following instructions pertain to all current and recent Symantec antivirus products, including the Symantec AntiVirus and Norton AntiVirus product lines. 1. Disable System Restore (Windows Me/XP). 2. Update the virus definitions. 3. Run a full system scan. 4. Delete any values added to the registry.
WebAttackTrojan.cloud.Gen Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects file downloads related to Trojan.Gen. Additional Information Trojan.Gen is a generic detection for many individual but varied Trojans for which specific definitions have not been created. A generic detection is used because it protects against many Trojans that share similar characteristics. Trojan horse programs pose as legitimate programs or files that users may recognize and want to use. They rely on this trick to lure a user into inadvertently running the Trojan. Often a Trojan will mimic a well known legitimate file name or pose as a particular type of file, like a .jpg or .doc file to trick a user. Distribution of Trojans on to compromised computers occurs in a variety of ways. From email attachments and links to instant messages, drive-by downloads and being dropped by other malicious software. Once installed on the compromised computer, the Trojan begins to perform the predetermined actions that it was designed for. Affected Windows Response No further action is required but you may wish to perform some of the following actions as a precautionary measure. • Update your product definitions and perform a full system scan. • Submit suspicious files to Symantec for analysis. If you believe that the signature is reported erroneously, please read the following:
Web Attack: Trojan.Coinbitminer Download Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Coinminer activity on the infected machine. Additional Information Coinminer is a detection for a file based cryptocurrency miner that runs on your system. These miners consume enormous CPU resources, making computer use sluggish. If you have not installed the program, it might be installed through various malicious sources like bundled in PUA, exploitation, malware, etc. If you receive this signature's alert, it indicates your machine is hosted with Coinminer. Affected Various Operating System platforms
WebAttackTrojan.Gen.2Activity76 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects unclassified Trojan activity on the compromised computer. Additional Information Trojans allow the remote attackers to perform various malicious activities on the compromised machine. Affected Various platforms Response NA
WebAttackTrojan.Gen.2Activity76_1 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects unclassified Trojan activity on the compromised computer. Additional Information Trojans allow the remote attackers to perform various malicious activities on the compromised machine. Affected Various platforms Response NA
WebAttackTrojan.MaljavaDownload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description Trojan.Maljava is a detection name used by Symantec to identify malicious Java files that exploit one or more vulnerabilities. Additional Information Trojan.Maljava is a detection name used by Symantec to identify malicious Java files that exploit one or more vulnerabilities. Affected Various Windows platforms. Response
WebAttackTrojan.MaljavaDownload4 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description Trojan.Maljava is a detection name used by Symantec to identify malicious Java files that exploit one or more vulnerabilities. Additional Information Trojan.Maljava is a detection name used by Symantec to identify malicious Java files that exploit one or more vulnerabilities. Affected Various Windows platforms. Response
WebAttackTrojan.MalscriptActivity12 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects traffic generated by Trojan.Malscript which could lead to further infection of the affected system. Additional Information Trojan.Malscript is a heuristic detection for Web-based malicious script files that exploit vulnerabilities and/or perform heap spraying. Files that are detected as Trojan.Malscript are considered malicious. We suggest that any files you believe are incorrectly detected be submitted to Symantec Security Response. For instructions on how to do this using Scan and Deliver, read Submit Virus Samples. Affected Windows
WebAttackTrojan.MalscriptActivity13 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects traffic generated by Trojan.Malscript which could lead to further infection of the affected system. Additional Information Trojan.Malscript is a heuristic detection for Web-based malicious script files that exploit vulnerabilities and/or perform heap spraying. Files that are detected as Trojan.Malscript are considered malicious. We suggest that any files you believe are incorrectly detected be submitted to Symantec Security Response. For instructions on how to do this using Scan and Deliver, read Submit Virus Samples. Affected Windows
WebAttackTrojan.MalscriptActivity14 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects traffic generated by Trojan.Malscript which could lead to further infection of the affected system. Additional Information Trojan.Malscript is a heuristic detection for Web-based malicious script files that exploit vulnerabilities and/or perform heap spraying. Files that are detected as Trojan.Malscript are considered malicious. We suggest that any files you believe are incorrectly detected be submitted to Symantec Security Response. For instructions on how to do this using Scan and Deliver, read Submit Virus Samples. Affected Windows
WebAttackTrojan.MalscriptActivity9 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects traffic generated by Trojan.Malscript which could lead to further infection of the affected system. Additional Information Trojan.Malscript is a heuristic detection for Web-based malicious script files that exploit vulnerabilities and/or perform heap spraying. Files that are detected as Trojan.Malscript are considered malicious. We suggest that any files you believe are incorrectly detected be submitted to Symantec Security Response. For instructions on how to do this using Scan and Deliver, read Submit Virus Samples. Affected Windows
Web Attack: Trojan.Malscript Redirection Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects traffic generated by Trojan.Malscript which could lead to further infection of the affected system. Additional Information Trojan.Malscript is a heuristic detection for Web-based malicious script files that exploit vulnerabilities and/or perform heap spraying. Files that are detected as Trojan.Malscript are considered malicious. We suggest that any files you believe are incorrectly detected be submitted to Symantec Security Response. For instructions on how to do this using Scan and Deliver, read Submit Virus Samples. Affected Windows
WebAttackTrojan.MDropperDownload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Trojan.Mdropper activity on compromised machines. Additional Information Trojan.Mdropper is a type of Trojan whose purpose is to deliver an enclosed payload onto a destination host computer. A dropper is a means to an end rather than the end itself. In other words, the dropper is usually used at the start or in the early stages of a malware attack. Affected Various Windows platform.
WebAttackTrojan.OldishellActivity Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description Trojan.Oldishell is a Trojan horse that opens a backdoor and may perform malicious activities on the compromised computer. Additional Information Trojan.Oldishell is a Trojan horse that opens a backdoor and may perform malicious activities on the compromised computer. Affected Various platform Response
WebAttackTrojan.OldishellActivity_1 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description Trojan.Oldishell is a Trojan horse that opens a backdoor and may perform malicious activities on the compromised computer. Additional Information Trojan.Oldishell is a Trojan horse that opens a backdoor and may perform malicious activities on the compromised computer. Affected Various platform Response
WebAttackTrojan.Ransomlock.g14Download Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Ransom malware activity on the infected machine. Additional Information Ransom malware infects the machines and locks down access to the machine. In order to restore access to the machine it demands a ransom from the user. Affected Various platforms
WebAttackTrojan.Ransomlock.g21Download Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Ransom malware activity on the infected machine. Additional Information Ransom malware infects the machines and locks down access to the machine. In order to restore access to the machine it demands a ransom from the user. Affected Various platforms