Snort mailing list archives

Re: New sig for detecting TP-Link TDDP SET_CONFIG type buffer overflow


From: Joshua Williams <joshuwi2 () sourcefire com>
Date: Tue, 22 Nov 2016 16:13:39 -0500

rmkml,

Thanks for your submission. I'll review and test this signature and get
back to you when it's finished.

--
Josh Williams
Detection Response Team
TALOS Security Group

On Tue, Nov 22, 2016 at 3:42 PM, rmkml <rmkml () ligfy org> wrote:

Hi,

Please check a new sig for detecting TP-Link TDDP SET_CONFIG type buffer
overflow:

alert udp $EXTERNAL_NET any -> $HOME_NET 1040 (msg:"MISC TP-Link TDDP
SET_CONFIG type buffer overflow attempt";
dsize:>336; content:"|01 01 00|"; depth:3; offset:0;
byte_test:4,>=,0x0264,4,big;
reference:url,www.coresecurity.com/advisories/tp-link-tddp-multiple-
vulnerabilities;
classtype:attempted-recon; sid:1; rev:1;)

Don't forget check variables.

Please send any comments.

Regards
@Rmkml

------------------------------------------------------------
------------------
_______________________________________________
Snort-sigs mailing list
Snort-sigs () lists sourceforge net
https://lists.sourceforge.net/lists/listinfo/snort-sigs

http://www.snort.org

Please visit http://blog.snort.org for the latest news about Snort!

Visit the Snort.org to subscribe to the official Snort ruleset, make sure
to stay up to date to catch the most <a href="
https://snort.org/downloads/#rule-downloads";>emerging threats</a>!

------------------------------------------------------------------------------
_______________________________________________
Snort-sigs mailing list
Snort-sigs () lists sourceforge net
https://lists.sourceforge.net/lists/listinfo/snort-sigs

http://www.snort.org

Please visit http://blog.snort.org for the latest news about Snort!

Visit the Snort.org to subscribe to the official Snort ruleset, make sure to stay up to date to catch the most <a 
href=" https://snort.org/downloads/#rule-downloads";>emerging threats</a>!

Current thread: