Snort mailing list archives

Netgear Arbitrary Command Execution sig


From: James Lay <jlay () slave-tothe-box net>
Date: Mon, 12 Dec 2016 14:31:32 -0700

I can't imagine anyone running a port 80 Netgear on the WAN side, but 
eh...stranger things have happened:

alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP 
Netgear Arbitrary Command Execution Attempt"; 
flow:established,to_server; content:"GET"; http_method; nocase; 
content:"/cgi-bin/|3B|"; http_uri; nocase; reference:url, 
http://www.sj-vs.net/a-temporary-fix-for-cert-vu582384-cwe-77-on-netgear-r7000-and-r6400-routers; 
reference:cve,2016-582384; classtype:attempted-dos; sid:xxxxxxx; rev:1;)

James

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most 
engaging tech sites, SlashDot.org! http://sdm.link/slashdot
_______________________________________________
Snort-sigs mailing list
Snort-sigs () lists sourceforge net
https://lists.sourceforge.net/lists/listinfo/snort-sigs

http://www.snort.org

Please visit http://blog.snort.org for the latest news about Snort!

Visit the Snort.org to subscribe to the official Snort ruleset, make sure to stay up to date to catch the most <a 
href=" https://snort.org/downloads/#rule-downloads";>emerging threats</a>!


Current thread: