Rule Category

EXPLOIT-KIT -- Snort has alerted on traffic that is typical of known exploit kits. Exploit kits are pre-packaged sets of code and malware geared toward finding and taking advantage of common browser vulnerabilities. They are Javascript code that provides an entry point to a system to initiate the next state. Snort's rules look for known exploit kit nomenclature, information sent back exposing sensitive infrastructure, attempts to reach a certain file, etc. Rules try to identify the exact kit being used based on actor-group patterns, such as favored target website, malware types, and code similarities.

Alert Message

EXPLOIT-KIT Blackhole exploit kit JavaScript carat string splitting with hostile applet

Rule Explanation

Unspecified vulnerability in the RDS.Dataspace ActiveX control, which is contained in ActiveX Data Objects (ADO) and distributed in Microsoft Data Access Components (MDAC) 2.7 and 2.8, allows remote attackers to execute arbitrary code via unknown attack vectors. Impact: CVSS base score 5.1 CVSS impact score 6.4 CVSS exploitability score 4.9 confidentialityImpact PARTIAL integrityImpact PARTIAL availabilityImpact PARTIAL Details: Ease of Attack:

What To Look For

No information provided

Known Usage

No public information

False Positives

No known false positives

Contributors

Talos research team. This document was generated from data supplied by the national vulnerability database, a product of the national institute of standards and technology. For more information see [nvd].

Rule Groups

No rule groups

CVE

Additional Links

Rule Vulnerability

CVE Additional Information

This product uses data from the NVD API but is not endorsed or certified by the NVD.
CVE-2006-0003
Loading description
CVE-2007-5659
Loading description
CVE-2008-0655
Loading description
CVE-2008-2992
Loading description
CVE-2009-0927
Loading description
CVE-2010-1885
Loading description
CVE-2011-0559
Loading description
CVE-2011-2110
Loading description
CVE-2011-3544
Loading description
CVE-2012-0188
Loading description
CVE-2012-0507
Loading description
CVE-2012-1723
Loading description
CVE-2012-1889
Loading description
CVE-2012-4681
Loading description