Snort mailing list archives
Re: MSDTC Vulnerability Rule?
From: Brian <bmc () snort org>
Date: Wed, 6 Feb 2002 18:17:08 -0500
According to John:
Hello Eric, With the limited details of this bug I came up with a simple rule. It will (as usual) require some work from the IDS analysis. alert tcp $EXTERNAL_NET any -> $HOME_NET 3372 (msg:"Possible MSDTC DoS"; flags: A+; dsize: >1024; reference:bugtraq,4006; classtype:attempted-dos;)
God sig, except according to SecurityFocus's bugtraq database the dos can be accomplishedby using 1024 bytes or more of random data. When I get a chance to commit it to CVS, the sig will be like below. alert tcp $EXTERNAL_NET any -> $HOME_NET 3372 (msg:"EXPERIMENTAL MSDTC DoS"; flags:A+; dsize:>1023; reference:bugtraq,4006; classtype:attempted-dos; sid:1408; rev:1;) -brian _______________________________________________ Snort-users mailing list Snort-users () lists sourceforge net Go to this URL to change user options or unsubscribe: https://lists.sourceforge.net/lists/listinfo/snort-users Snort-users list archive: http://www.geocrawler.com/redir-sf.php3?list=snort-users
Current thread:
- MSDTC Vulnerability Rule? Eric Johansen (Feb 04)
- Re: MSDTC Vulnerability Rule? John (Feb 04)
- Re: MSDTC Vulnerability Rule? Brian (Feb 07)
- Re: MSDTC Vulnerability Rule? John (Feb 04)
