""ET EXPLOIT Possible Windows DNS Integer Overflow Attempt M2 (CVE-2020-1350)""
SID: 2030532
Revision: 5
Class Type: attempted-admin
Metadata: affected_product Windows_DNS_server, created_at 2020_07_14, cve CVE_2020_1350, performance_impact Significant, signature_severity Critical, updated_at 2020_07_16
Reference:
Protocol: tcp
Source Network: any
Source Port: any
Destination Network: any
Destination Port: 53
Flow: established,to_server
Contents:
-
Value: "|00 00 18|"
-
Value: "|c0|"
-
Value: "|00 18|"
Within: 2
PCRE:
Special Options:
- fast_pattern