""ET EXPLOIT Possible Postfix CVE-2014-6271 attempt""

SID: 2019389

Revision: 4

Class Type: attempted-admin

Metadata: created_at 2014_10_10, cve CVE_2014_6271, updated_at 2015_11_24

Reference:

  • cve

  • 2014-6271

Protocol: tcp

Source Network: any

Source Port: any

Destination Network: $HOME_NET

Destination Port: [25,587]

Flow: to_server,established

Contents:

  • Value: "|28 29 20 7b|"

Within:

PCRE: "/^[a-z-]+\s?\x3a\s?[^\r\n]?\x28\x29\x20\x7b.\x3b.\x7d\s\x3b(?!=[\r\n])/mi"

Special Options:

source