SHELLCODE: Metasploit Decoder Routine for X86 HTTP-STC
This signature detect payloads being transferred over HTTP protocol that have been encoded using Metasploit X86 encoder routine. This could be an indication that the session is an attack coming from a Metasploit attacker.
Extended Description
BACnet OPC Client is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. An attacker can exploit this issue to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions.
Affected Products
Scada_engine bacnet_opc_client
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Scada_engine
9.3