""ET EXPLOIT Possible Symantec Malicious MIME Doc Name Overflow (EICAR) toclient M4""

SID: 2022936

Revision: 2

Class Type: attempted-admin

Metadata: created_at 2016_06_30, updated_at 2022_05_03

Reference:

Protocol: tcp

Source Network: $EXTERNAL_NET

Source Port: any

Destination Network: $HOME_NET

Destination Port: any

Flow: established,to_client

Contents:

  • Value: "Content-Type|3a 20|"

  • Value: "name"

  • Value: "|57 44 56 50 49 56 41 6c 51 45 46 51 57 7a 52 63 55 46 70 59 4e 54 51 6f 55 46 34 70 4e 30 4e 44 4b 54 64 39 4a 45 56 4a 51 30 46 53|"

Within:

PCRE: "/^\s=\s[\x22\x27][^\x22\x27\r\n]{78}/R"

Special Options:

  • nocase

  • nocase

source