HTTP: Javascript var heapspray and shellcode Attempt Detection
This signature detects attempts to trigger an exploit that leverages a precise Heap Spraying and shellcode techniques referred to as "js_property_spray". Such exploits are part of an attack that, if successful, could allow an attacker to execute arbitrary code on the targeted system.
Extended Description
Google Chrome before 41.0.2272.118 does not properly handle the interaction of IPC, the Gamepad API, and Google V8, which allows remote attackers to execute arbitrary code via unspecified vectors.
References
CVE: CVE-2020-16040
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
7.5
7.6
6.8
4.3