Rule Category

SERVER-OTHER -- Snort has detected traffic exploiting vulnerabilities in a server in the network.

Alert Message

SERVER-OTHER Exim malformed BDAT code execution attempt

Rule Explanation

This event is generated when a code execution attempt is detected in Exim. Impact: Attempted Administrator Privilege Gain Details: In the SMTP daemon in Exim 4.88 and 4.89 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via vectors involving BDAT commands. Recommendation: Upgrade to the latest version of software and apply the appropriate vendor-supplied patches. The host should be checked for potential compromise. Ease of Attack:

What To Look For

This rule alerts on initial exploit traffic.

Known Usage

No public information

False Positives

No known false positives

Contributors

Cisco Talos Intelligence Group

Rule Groups

No rule groups

CVE

Rule Vulnerability

Use After Free

Use After Free (UAF) attacks target computer memory flaws to corrupt the memory execute code. The name refers to attempts to use memory after it has been freed, which can cause a program to crash under normal circumstances, or result in remote code execution in a successful attack.

CVE Additional Information

This product uses data from the NVD API but is not endorsed or certified by the NVD.
CVE-2017-16943
Loading description

MITRE ATT&CK Framework

Tactic: Execution

Technique: Trusted Developer Utilities

For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org