OS-WINDOWS -- Snort has detected traffic targeting vulnerabilities in a Windows-based operating system. This does not include browser traffic or other software on the OS, but attacks against the OS itself. (such as?)
OS-WINDOWS Microsoft Windows Winsock local privilege escalation attempt
This rule looks for bytes which correspond to bytes in a binary that contains bytes in a binary that disassemble to a specific series of thunk functions.
This rule will trigger when a file is sent via SMTP. Said file contains bytes which correspond to bytes in a binary that disassemble to a specific series of thunk functions.
No public information
No known false positives
Cisco Talos Intelligence Group
No rule groups
Escalation of Privilege
An Escalation of Privilege (EOP) attack is any attack method that results in a user or application gaining permissions to access resources they normally would not have access to.
CVE-2022-24507Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability.
Tactic: Privilege Escalation
Technique: Exploitation for Privilege Escalation
For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org