SHELLCODE: Metasploit Decoder Routine for x86 (TCP-CTS1)

This signature detect the transfer of a Metasploit x86 payload decoding loop. This could be an indication that the session is an attack coming from a Metasploit attacker.

Extended Description

HP OpenView Network Node Manager is prone to a remote code-execution vulnerability because the 'webappmon.exe' CGI application fails to adequately validate user-supplied input. Successful exploits can allow an attacker to execute arbitrary code with the privileges of the user running the webserver. Failed exploit attempts will likely result in denial-of-service conditions. OpenView Network Node Manager 7.51 and 7.53 are vulnerable.

Affected Products

Hp openview_network_node_manager

References

BugTraq: 42154 43289 33926

CVE: CVE-2010-2709

URL: http://www.metasploit.org/

Short Name
SHELLCODE:MSF:DCX86-CTS
Severity
Critical
Recommended
False
Recommended Action
Drop
Category
SHELLCODE
Keywords
(TCP-CTS1) CVE-2010-2709 Decoder Metasploit Routine bid:33926 bid:42154 bid:43289 for x86
Release Date
05/19/2011
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
Port
TCP/0-79,81-442,444-3127,3129-7999,8001-8079,8081-65535
False Positive
Unknown
Vendors

Hp

CVSS Score

9.3

Found a potential security threat?