Rule Category

BROWSER-IE -- Snort has detected traffic known to exploit vulnerabilities present in the Internet Explorer browser, or products that have the Trident or Tasman engines.

Alert Message

BROWSER-IE Microsoft Windows Scripting Engine memory corruption attempt

Rule Explanation

This rule looks for specially crafted JavaScript known to exploit a memory corruption vulnerability in the Windows Scripting Engine.

What To Look For

This rule fires on attempts to exploit a memory corruption vulnerability in the Windows Scripting Engine.

Known Usage

No public information

False Positives

No known false positives

Contributors

Cisco Talos Intelligence Group

Rule Groups

MITRE::ATT&CK Framework::Enterprise::Execution::User Execution::Malicious File

MITRE::ATT&CK Framework::Enterprise::Initial Access::Drive-by Compromise

CVE

Additional Links

Rule Vulnerability

Memory Corruption

Memory Corruption is any vulnerability that allows the modification of the content of memory locations in a way not intended by the developer. Memory corruption results are inconsistent; they could lead to fatal errors and system crashes or data leakage; some have no effect at all.

CVE Additional Information

This product uses data from the NVD API but is not endorsed or certified by the NVD.
CVE-2024-38178
Loading description