OS-WINDOWS -- Snort has detected traffic targeting vulnerabilities in a Windows-based operating system. This does not include browser traffic or other software on the OS, but attacks against the OS itself. (such as?)
OS-WINDOWS Microsoft Windows raw WriteAndX InData pointer adjustment attempt
This event is generated when an attempt to exploit an SMB connection using exploits seen in the APT3 Bemstour campaign. Impact: Potential Remote Code Execution Details: This alert is triggered when SMB traffic that closely resembles an exploit observed in the APT3 Bemstour campaign. This rule is a generic rule used to detect suspicious activity in the SMB transactions that could indicate an exploit. Ease of Attack: Simple
This rule fires when an attempt to exploit a Windows SMB vulnerability is detected on the network.
No public information
No known false positives
Cisco Talos Intelligence Group
Tactic: Initial Access
Technique: Exploit Public-Facing Application
For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org
Memory Corruption
Memory Corruption is any vulnerability that allows the modification of the content of memory locations in a way not intended by the developer. Memory corruption results are inconsistent; they could lead to fatal errors and system crashes or data leakage; some have no effect at all.