SHELLCODE: X86 Microsoft Win32 Export Table Enumeration Variant Detection Over HTTP-STC
This signature detects payloads being transferred over network that have been using x86 Microsoft Win32 export table enumeration variant. This may be an indication of someone trying to evade anti-virus/IPS solutions and possibly drop malicious code.
Extended Description
Stack-based buffer overflow in the CreateSizedDIBSECTION function in shimgvw.dll in the Windows Shell graphics processor (aka graphics rendering engine) in Microsoft Windows XP SP2 and SP3, Server 2003 SP2, Vista SP1 and SP2, and Server 2008 Gold and SP2 allows remote attackers to execute arbitrary code via a crafted .MIC or unspecified Office document containing a thumbnail bitmap with a negative biClrUsed value, as reported by Moti and Xu Hao, aka "Windows Shell Graphics Processing Overrun Vulnerability."
Affected Products
Microsoft windows_server_2003
References
BugTraq: 35190 35184 33870 38103 21922 34351 38555 34876 46075
CVE: CVE-2010-0264
URL: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=790 http://www.vupen.com/english/advisories/2009/1546 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=461 http://www.cisco.com/warp/public/707/cisco-sa-20110201-webex.shtml http://www.coresecurity.com/content/webex-atp-and-wrf-overflow-vulnerabilities http://www.zerodayinitiative.com/advisories/zdi-09-019/ http://www.coresecurity.com/content/core-2009-1103
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Microsoft