Rule Category

PUA-OTHER -- Snort has detected a Potentially Unwanted Application (PUA). This Is a program which installs adware or toolbars, collects information, runs unwanted processes that consume computing resources, or has otherwise unclear objectives. These are usually additional programs bundled with legitimate programs. Some users consider the benefit of the main application to outweigh the risks of the PUA; you are paying for a free product by contributing with advertising or data. These alerts are often assigned a lower risk, as they are not directly malicious or as fast-spreading as worms or trojans. This alert concerns traffic typical of PUAs that are not common enough to warrant their own category. This is commonly associated with cryptocurrency mining activity.

Alert Message

PUA-OTHER Microsoft MSN Messenger png overflow

Rule Explanation

Unknown vulnerability in MySQL 3.23.58 and earlier, when a local user has privileges for a database whose name includes a "_" (underscore), grants privileges to other databases that have similar names, which can allow the user to conduct unauthorized activities. Impact: CVSS base score 6.8 CVSS impact score 6.4 CVSS exploitability score 8.6 confidentialityImpact PARTIAL integrityImpact PARTIAL availabilityImpact PARTIAL Details: Ease of Attack:

What To Look For

Known Usage

No public information

False Positives

No known false positives

Contributors

Talos research team. This document was generated from data supplied by the national vulnerability database, a product of the national institute of standards and technology. For more information see [nvd].

MITRE ATT&CK Framework

Tactic:

Technique:

For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org

CVE

Additional Links

CVE Additional Information

CVE-2004-0957
Unknown vulnerability in MySQL 3.23.58 and earlier, when a local user has privileges for a database whose name includes a "_" (underscore), grants privileges to other databases that have similar names, which can allow the user to conduct unauthorized activities.
Details
SeverityMEDIUM Base Score6.8
Impact Score6.4 Exploit Score8.6
Confidentiality ImpactPARTIAL Integrity ImpactPARTIAL
Availability ImpactPARTIAL Access Vector
AuthenticationNONE Ease of Access