""ET EXPLOIT Possible Windows DNS Integer Overflow Attempt M2 (CVE-2020-1350)""

SID: 2030532

Revision: 5

Class Type: attempted-admin

Metadata: affected_product Windows_DNS_server, created_at 2020_07_14, cve CVE_2020_1350, performance_impact Significant, signature_severity Critical, updated_at 2020_07_16

Reference:

Protocol: tcp

Source Network: any

Source Port: any

Destination Network: any

Destination Port: 53

Flow: established,to_server

Contents:

  • Value: "|00 00 18|"

  • Value: "|c0|"

  • Value: "|00 18|"

Within: 2

PCRE:

Special Options:

  • fast_pattern

source