SHELLCODE: X86 Microsoft Win32 Export Table Enumeration Variant Detection Over HTTP-STC

This signature detects payloads being transferred over network that have been using x86 Microsoft Win32 export table enumeration variant. This may be an indication of someone trying to evade anti-virus/IPS solutions and possibly drop malicious code.

Extended Description

Stack-based buffer overflow in the CreateSizedDIBSECTION function in shimgvw.dll in the Windows Shell graphics processor (aka graphics rendering engine) in Microsoft Windows XP SP2 and SP3, Server 2003 SP2, Vista SP1 and SP2, and Server 2008 Gold and SP2 allows remote attackers to execute arbitrary code via a crafted .MIC or unspecified Office document containing a thumbnail bitmap with a negative biClrUsed value, as reported by Moti and Xu Hao, aka "Windows Shell Graphics Processing Overrun Vulnerability."

Affected Products

Microsoft windows_server_2003

Short Name
SHELLCODE:X86:WIN32-ENUM-80S
Severity
Critical
Recommended
True
Recommended Action
Drop
Category
SHELLCODE
Keywords
CVE-2007-0031 CVE-2009-0238 CVE-2009-0556 CVE-2009-0565 CVE-2009-1137 CVE-2009-1533 CVE-2010-0031 CVE-2010-0264 CVE-2010-3269 Detection Enumeration Export HTTP-STC Microsoft Over Table Variant Win32 X86 bid:21922 bid:33870 bid:34351 bid:34876 bid:35184 bid:35190 bid:38103 bid:38555 bid:46075
Release Date
08/17/2015
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3708
False Positive
Unknown
Vendors

Microsoft

Found a potential security threat?