FILE-OTHER -- Snort detected traffic targeting vulnerabilities in a file type that does not require enough rule coverage to have its own category.
FILE-OTHER Microsoft .NET API XPS file parsing remote code execution attempt
The rule is looking for following malicious compressed content of `FixedDocumentSequence.fdseq` file inside a XPS file. ``` |77 90 22 C5 8A 0B 88 5E 7D B8 50 B5 EA 7A 38 BC 51 AD F1 B5 DA 24 A4 FC 87 E1 6C 94 DD 0 F 25 59| ```
The rule alerts when clients attempts to download malicious XPS file. This XPS file can cause remote code execution by exploiting CVE-2020-0605
No public information
No known false positives
Cisco Talos Intelligence Group
No rule groups
Insecure Deserialization relates to web application security. Applications turn an object into data through serialization; the reverse of that process, deserialization, can be vulnerable to attacks when the application trusts the data that is being deserialized. Serialized data is machine readable and not encrypted; serialized user-supplied data should not be trusted. Deserialization attacks can lead to remote code execution.