BROWSER-IE -- Snort has detected traffic known to exploit vulnerabilities present in the Internet Explorer browser, or products that have the Trident or Tasman engines.
BROWSER-IE Microsoft Internet Explorer VML shape object malformed path attempt
This rule will alert when an attacker provides a maliciously crafted HTML page with the definition of a VML object that causes a memory leak in the victim's browser
This rule will alert when there's an attempt to exploit a memory leak using a malformed VLM shape object
No public information
No known false positives
Cisco Talos Intelligence Group
MITRE::ATT&CK Framework::Enterprise::Initial Access::Drive-by Compromise
MITRE::ATT&CK Framework::Enterprise::Execution::User Execution::Malicious File
Memory Corruption
Memory Corruption is any vulnerability that allows the modification of the content of memory locations in a way not intended by the developer. Memory corruption results are inconsistent; they could lead to fatal errors and system crashes or data leakage; some have no effect at all.
CVE-2013-0030 |
Loading description
|