OS-WINDOWS -- Snort has detected traffic targeting vulnerabilities in a Windows-based operating system. This does not include browser traffic or other software on the OS, but attacks against the OS itself.
OS-WINDOWS Microsoft Windows DHCP Server remote code execution attempt
This event is generated when an attempt to exploit a vulnerability in a Windows DHCP Server is detected Impact: High Details: There is an issue when using DHCP option 43 in Windows DHCP server that can cause an overflow in the server due to unhandled verification of data sizes and the way how the server reassembles the received data. This can cause the server to overwrite sections of memory with a maliciously crafted code and gain control over the server. Ease of Attack: Medium
This rule will alert when there's an attempt to exploit CVE-2019-0626 when sending a maliciously crafted DHCP packet that might execute remote code
No public information
No known false positives
Cisco Talos Intelligence Group
No rule groups
Command Injection
Command Injection attacks target applications that allow unsafe user-supplied input. Attackers transmit this input via forms, cookies, HTTP headers, etc. and exploit the applications permissions to execute system commands without injecting code.
CVE-2019-0626 |
Loading description
|
Tactic: Execution
Technique: User Execution
For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org