""ET EXPLOIT PCMan FTP Server 2.0.7 Remote Command Execution""
SID: 2020585
Revision: 2
Class Type: attempted-admin
Metadata: created_at 2015_03_03, updated_at 2015_03_03
Reference:
Protocol: tcp
Source Network: $EXTERNAL_NET
Source Port: any
Destination Network: $HOME_NET
Destination Port: 21
Flow: to_server,established
Contents:
-
Value: "|65 82 a5 7c|"
-
Value: "|90 90 90 90 90|"
Within: 10
PCRE:
Special Options:
- fast_pattern