[Snort-sigs] New sig for detecting TP-Link TDDP SET_CONFIG type buffer overflow

Joshua Williams joshuwi2 at ...435...
Tue Nov 22 16:13:39 EST 2016


rmkml,

Thanks for your submission. I'll review and test this signature and get
back to you when it's finished.

--
Josh Williams
Detection Response Team
TALOS Security Group

On Tue, Nov 22, 2016 at 3:42 PM, rmkml <rmkml at ...4129...> wrote:

> Hi,
>
> Please check a new sig for detecting TP-Link TDDP SET_CONFIG type buffer
> overflow:
>
> alert udp $EXTERNAL_NET any -> $HOME_NET 1040 (msg:"MISC TP-Link TDDP
> SET_CONFIG type buffer overflow attempt";
> dsize:>336; content:"|01 01 00|"; depth:3; offset:0;
> byte_test:4,>=,0x0264,4,big;
> reference:url,www.coresecurity.com/advisories/tp-link-tddp-multiple-
> vulnerabilities;
> classtype:attempted-recon; sid:1; rev:1;)
>
> Don't forget check variables.
>
> Please send any comments.
>
> Regards
> @Rmkml
>
> ------------------------------------------------------------
> ------------------
> _______________________________________________
> Snort-sigs mailing list
> Snort-sigs at lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/snort-sigs
>
> http://www.snort.org
>
> Please visit http://blog.snort.org for the latest news about Snort!
>
> Visit the Snort.org to subscribe to the official Snort ruleset, make sure
> to stay up to date to catch the most <a href="
> https://snort.org/downloads/#rule-downloads">emerging threats</a>!
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.snort.org/pipermail/snort-sigs/attachments/20161122/ed596935/attachment.html>


More information about the Snort-sigs mailing list