Rule Category

FILE-OTHER -- Snort detected traffic targeting vulnerabilities in a file type that does not require enough rule coverage to have its own category.

Alert Message

FILE-OTHER Microsoft Windows malformed .themepack Theme API remote code execution attempt

Rule Explanation

This event is generated when a crafted Microsoft Windows Themepack designed to write to the local filesystem traverses the corporate network. Impact: Attempted User Privilege Gain Details: An input validation vulnerability has been identified in Windows. The error is in the way certain Windows components parse ".thempack" file extensions. Windows theme files are simply a configuration file that allows users to create and save windows themes. Typically, these themes are shared with other users over the Internet. .themepack files are compressed theme files that can be shared in the same way with other users over the internet. Ease of Attack:

What To Look For

No information provided

Known Usage

No public information

False Positives

No known false positives

Contributors

Cisco Talos Intelligence Group

Rule Groups

No rule groups

CVE

Additional Links

Rule Vulnerability

CVE Additional Information

This product uses data from the NVD API but is not endorsed or certified by the NVD.
CVE-2018-8413
Loading description