""ET EXPLOIT Possible Postfix CVE-2014-6271 attempt""
SID: 2019389
Revision: 4
Class Type: attempted-admin
Metadata: created_at 2014_10_10, cve CVE_2014_6271, updated_at 2015_11_24
Reference:
-
cve
-
2014-6271
Protocol: tcp
Source Network: any
Source Port: any
Destination Network: $HOME_NET
Destination Port: [25,587]
Flow: to_server,established
Contents:
- Value: "|28 29 20 7b|"
Within:
PCRE: "/^[a-z-]+\s?\x3a\s?[^\r\n]?\x28\x29\x20\x7b.\x3b.\x7d\s\x3b(?!=[\r\n])/mi"
Special Options: