Rule Category

SERVER-OTHER -- Snort has detected traffic exploiting vulnerabilities in a server in the network.

Alert Message

SERVER-OTHER X.509 IPAddressFamily extension buffer overread attempt

Rule Explanation

This event is generated when an attacker attempts to exploit a buffer overread in OpenSSL. Impact: Attempted Information Leak Details: Rule checks for an attempt to exploit a buffer overread when parsing X.509 certificates with a malformed IPAddressFamily extension. Ease of Attack: Medium

What To Look For

Known Usage

No public information

False Positives

No known false positives

Contributors

Cisco Talos Intelligence Group

MITRE ATT&CK Framework

Tactic:

Technique:

For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org

CVE

Rule Vulnerability

CVE Additional Information

CVE-2017-3735
While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and 1.1.0g.
Details
Severity Base Score5.3
Impact Score1.4 Exploit Score3.9
Confidentiality ImpactNONE Integrity ImpactLOW
Availability ImpactNONE Access Vector
Authentication Ease of Access