SHELLCODE: Metasploit x86/fnstenv_mov Encoder Routine Over HTTP-STC

This signature detects Metasploit shell code being sent as part of an exploit payload, specifically the Windows Execution shell, using the variable-length fnstenv/mov dword XOR encoder (x86/fnstenv_mov). This is a strong indication of malicious activity on your network.

Extended Description

Microsoft Excel is prone to a remote code-execution vulnerability. Attackers may exploit this issue by enticing victims into opening a maliciously crafted Excel ('.xls') file. Successful exploits may allow attackers to execute arbitrary code with the privileges of the user running the application.

Affected Products

Microsoft excel_2007

Short Name
SHELLCODE:X86:FNSTENV-80S
Severity
Critical
Recommended
False
Recommended Action
Drop
Category
SHELLCODE
Keywords
CVE-2005-0555 CVE-2006-0476 CVE-2006-1043 CVE-2006-3086 CVE-2006-4694 CVE-2007-2193 CVE-2008-0105 CVE-2008-4019 CVE-2008-4265 CVE-2009-0235 CVE-2009-1134 CVE-2010-3951 CVE-2011-1276 CVE-2011-1774 CVE-2011-3494 CVE-2012-0013 Encoder HTTP-STC Metasploit Over Routine bid:13117 bid:16410 bid:16953 bid:18500 bid:20226 bid:23620 bid:27658 bid:31706 bid:32618 bid:34470 bid:35175 bid:35246 bid:37511 bid:45278 bid:48161 bid:51284 x86/fnstenv_mov
Release Date
09/25/2013
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3712
False Positive
Unknown
Vendors

Microsoft

Found a potential security threat?