Home page logo

snort logo Snort mailing list archives

Re: Possible FP 12280?
From: L0rd Ch0de1m0rt <l0rdch0de1m0rt () gmail com>
Date: Fri, 22 Oct 2010 10:24:31 -0500

Woah, that PCRE hurt my head.  First, why the <t> named capture buffer
if you never use it?  Then there is a .*? in there which doesn't make
sense to me.  Somebody tell me I'm not crazy.

This rule looks to be very specific to a PoC exploit and should
probably be retired since it is trivial to bypass.

The PoC on http://www.eeye.com/Resources/Security-Center/Research/Security-Advisories/AD20070814a
is this:

<v:imagedata src="http://malice/compressed.emz";>

I'm guessing the <t> named reference was supposed to be used at the
end of the PCRE but got left off or removed in version 2 ... yea, this
rule is totally created for the exploit and totally sux0rz since it
won't even match the above exploit since they forgot to include
characters like colon and forward slash in the [\w\x25\x2D\x2E]
character class.


-L0rd C.

On Fri, Oct 22, 2010 at 9:39 AM, Lay, James <james.lay () wincofoods com> wrote:

source file memory corruption"; flow:to_client,established;
content:"imagedata"; nocase;
reference:bugtraq,25310; reference:cve,2007-1749;
classtype:attempted-user; sid:12280; rev:2;)

Nokia and AT&T present the 2010 Calling All Innovators-North America contest
Create new apps & games for the Nokia N8 for consumers in  U.S. and Canada
$10 million total in prizes - $4M cash, 500 devices, nearly $6M in marketing
Develop with Nokia Qt SDK, Web Runtime, or Java and Publish to Ovi Store 
Snort-sigs mailing list
Snort-sigs () lists sourceforge net

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]