OS-WINDOWS -- Snort has detected traffic targeting vulnerabilities in a Windows-based operating system. This does not include browser traffic or other software on the OS, but attacks against the OS itself.
OS-WINDOWS Microsoft Windows Remote Desktop client DRDYNVC use after free attempt
This event is generated when an attacker attempts to exploit a remote code execution vulnerability in the Remote Desktop client. Impact: Attempted User Privilege Gain Details: This rule checks for attempts to exploit a use after free vulnerability in the Remote Desktop client's handling of Virtual Channels. Ease of Attack:
No information provided
No public information
No known false positives
Cisco Talos Intelligence Group
No rule groups
CVE-2019-1333 |
Loading description
|