Rule Category

OS-WINDOWS -- Snort has detected traffic targeting vulnerabilities in a Windows-based operating system. This does not include browser traffic or other software on the OS, but attacks against the OS itself. (such as?)

Alert Message

OS-WINDOWS Microsoft Windows SMB chained compression out of bounds read attempt

Rule Explanation

The rule looks for exploitation of a length field validation vulnerability.

What To Look For

This rule fires upon attempts to exploit a vulnerability in the Microsoft Windows SMB compressed message chain parsing functionality that may lead to kernel information disclosure and/or denial of service.

Known Usage

No public information

False Positives

No known false positives

Contributors

Cisco Talos Intelligence Group

MITRE ATT&CK Framework

Tactic: Impact

Technique: System Shutdown/Reboot

For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org

Additional Links

Rule Vulnerability

CVE Additional Information