HTTP: Suspicious JavaScript Function

This signature detects JavaScript sent through HTTP that appears suspicious. It can be an indication of an attempt to exploit a browser vulnerability. Successful attacks could result in arbitrary code execution.

Extended Description

Use-after-free vulnerability in the CDisplayPointer class in mshtml.dll in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted JavaScript code that uses the onpropertychange event handler, as exploited in the wild in September and October 2013, aka "Internet Explorer Memory Corruption Vulnerability."

Short Name
HTTP:STC:SUSPICIOUS-JS-FUNC
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
CVE-2010-0806 CVE-2013-2419 CVE-2013-3897 Function JavaScript Suspicious bid:38615
Release Date
10/04/2010
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3724
False Positive
Unknown
CVSS Score

9.3

5.0

Found a potential security threat?