[Snort-users] Rule 17494

waldo kitty wkitty42 at ...14940...
Fri Oct 1 16:14:52 EDT 2010


On 10/1/2010 15:08, Jefferson, Shawn wrote:
> Anyone else notice this rule, 17494 triggering a lot today?  Or is it just me…
> it’s an old vulnerability from 2006.
>
> alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"WEB-CLIENT Microsoft
> Internet Explorer Long URL Buffer Overflow attempt"; flow:established,to_server;
> urilen:>260; content:"GET"; http_method; content:"HTTP|2F|1|2E|1|0D 0A|";
> metadata:service http; reference:bugtraq,19667; reference:cve,2006-3869;
> classtype:attempted-user; sid:17494; rev:1;)


please remember to include the GID (and revision)... AFAICT, this is either a 
GID:3 (SO rule) or it is one of the new ones not yet available to "registered" 
users...

thank you ;)




More information about the Snort-users mailing list