[Snort-sigs] Netgear Arbitrary Command Execution sig

Joshua Williams joshuwi2 at ...435...
Mon Dec 12 16:38:46 EST 2016


James,

Thanks for your submission. I'll review and test this and get back to you
when it has finished.

--
Josh Williams
Detection Response Team
TALOS Security Group

On Mon, Dec 12, 2016 at 4:31 PM, James Lay <jlay at ...3266...> wrote:

> I can't imagine anyone running a port 80 Netgear on the WAN side, but
> eh...stranger things have happened:
>
> alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP
> Netgear Arbitrary Command Execution Attempt";
> flow:established,to_server; content:"GET"; http_method; nocase;
> content:"/cgi-bin/|3B|"; http_uri; nocase; reference:url,
> http://www.sj-vs.net/a-temporary-fix-for-cert-vu582384-cwe-77-on-netgear-
> r7000-and-r6400-routers;
> reference:cve,2016-582384; classtype:attempted-dos; sid:xxxxxxx; rev:1;)
>
> James
>
> ------------------------------------------------------------
> ------------------
> Check out the vibrant tech community on one of the world's most
> engaging tech sites, SlashDot.org! http://sdm.link/slashdot
> _______________________________________________
> Snort-sigs mailing list
> Snort-sigs at lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/snort-sigs
>
> http://www.snort.org
>
> Please visit http://blog.snort.org for the latest news about Snort!
>
> Visit the Snort.org to subscribe to the official Snort ruleset, make sure
> to stay up to date to catch the most <a href="
> https://snort.org/downloads/#rule-downloads">emerging threats</a>!
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.snort.org/pipermail/snort-sigs/attachments/20161212/fedca914/attachment.html>


More information about the Snort-sigs mailing list