SMB: Windows Execution (x86/fnstenv_mov) Shellcode (SMB-CTS1)

This signature detects shell code being sent as part of an exploit payload, specifically the Windows Execution shell, using the variable-length fnstenv/mov dword XOR encoder (x86/fnstenv_mov). This is a strong indication of malicious activity on your network.

Extended Description

Stack-based buffer overflow in the Plug and Play (PnP) service for Microsoft Windows 2000 and Windows XP Service Pack 1 allows remote attackers to execute arbitrary code via a crafted packet, and local users to gain privileges via a malicious application, as exploited by the Zotob (aka Mytob) worm.

Affected Products

Microsoft windows_xp

Short Name
SMB:FTENV-SHELL
Severity
Critical
Recommended
False
Recommended Action
Drop
Category
SMB
Keywords
(SMB-CTS1) (x86/fnstenv_mov) CVE-2005-1983 Execution Shellcode Windows bid:14513
Release Date
04/19/2011
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3761
False Positive
Unknown
Vendors

Microsoft

CVSS Score

10.0

Found a potential security threat?