""ET EXPLOIT Possible Windows DNS Integer Overflow Attempt M1 (CVE-2020-1350)""
SID: 2030533
Revision: 4
Class Type: attempted-admin
Metadata: affected_product Windows_DNS_server, created_at 2020_07_14, cve CVE_2020_1350, performance_impact Significant, signature_severity Critical, updated_at 2020_07_16
Reference:
Protocol: tcp
Source Network: any
Source Port: 53
Destination Network: any
Destination Port: any
Flow: established,from_server
Contents:
-
Value: "|00 00 18|"
-
Value: "|00 00 18|"
-
Value: "|c0|"
-
Value: "|00 18|"
Within: 2
PCRE:
Special Options:
- fast_pattern