Vulnerability Development mailing list archives
php exploit?
From: jon schatz <jon () divisionbyzero com>
Date: 27 Feb 2002 13:56:35 -0800
from the incidents list. has there been an "official" announcement yet? this just hit the snort-sigs list this afternoon: From: Brian <bmc () snort org> Date: Tue Feb 26, 2002 04:02:22 US/Pacific Subject: [Snort-sigs] php overflow signatures Below are the initial signatures for the PHP overflow that is about to get a bunch of publication. Have fun and whatnot. Sourceforge's CVS server is broken, so these are not yet in CVS. alert tcp $EXTERNAL_NET any -> $HOME_NET 80 (msg:"EXPERIMENTAL php content-disposition memchr overlfow"; flags:A+; content:"Content-Disposition\:"; content:"name=\"|CC CC CC CC CC|"; classtype:web-application-attack; sid:1423; rev:1;) alert ip $EXTERNAL_NET any -> $HOME_NET any (msg:"EXPERIMENTAL SHELLCODE x86 EB OC NOOP"; content:"|EB 0C EB 0C EB 0C EB 0C EB 0C EB 0C EB 0C EB 0C|"; classtype:shellcode-detect; sid:1424; rev:1;) alert tcp $EXTERNAL_NET any -> $HOME_NET 80 (msg:"EXPERIMENTAL php content-disposition"; flags:A+; content:"Content-Disposition\:"; content:"form-data\;"; classtype:web-application-attack; sid:1425; rev:1;) -jon -- jon () divisionbyzero com || www.divisionbyzero.com gpg key: www.divisionbyzero.com/pubkey.asc think i have a virus?: www.divisionbyzero.com/pgp.html "You are in a twisty little maze of Sendmail rules, all confusing."
Attachment:
signature.asc
Description: This is a digitally signed message part
Current thread:
- php exploit? jon schatz (Feb 27)