FILE-OTHER -- Snort detected traffic targeting vulnerabilities in a file type that does not require enough rule coverage to have its own category.
FILE-OTHER Go binary dll-load exploit attempt
This event is generated when a download of kernel32.dll is detected. Impact: Attempted User Privilege Gain Details: Go binaries from before version 1.12.2 will run any arbitrary kernel32.dll, winmm.dll, and ws2_32.dll in the same directory path, possibly leading to remote code execution. Ease of Attack:
No public information
No known false positives
Cisco Talos Intelligence Group
Tactic:
Technique:
For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org
CVE-2019-9634Go through 1.12 on Windows misuses certain LoadLibrary functionality, leading to DLL injection. |
|