SHELLCODE: Metasploit Decoder Routine for X86 HTTP-STC

This signature detect payloads being transferred over HTTP protocol that have been encoded using Metasploit X86 encoder routine. This could be an indication that the session is an attack coming from a Metasploit attacker.

Extended Description

BACnet OPC Client is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. An attacker can exploit this issue to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions.

Affected Products

Scada_engine bacnet_opc_client

References

BugTraq: 42154 43289

CVE: CVE-2010-2709

Short Name
SHELLCODE:MSF:DCX86-80S
Severity
Critical
Recommended
False
Recommended Action
Drop
Category
SHELLCODE
Keywords
CVE-2010-2709 Decoder HTTP-STC Metasploit Routine X86 bid:42154 bid:43289 for
Release Date
09/30/2013
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Scada_engine

CVSS Score

9.3

Found a potential security threat?