Rule to detect IE exploit.
http://vil.nai.com/vil/content/v_100927.htm

Your virus scanners detect this exploit. (mcafeee/clamscan...)
Your mileage may vary.

Will match these exploits:
Replace ttp with http (so it will slip by my scanner and mcafee.)

ttp://[EMAIL PROTECTED]/malicious.html
ttp://[EMAIL PROTECTED]/malicious.html
ttp://[EMAIL PROTECTED]/malicious.html
ttp://[EMAIL PROTECTED]

Attached is the sa local.cf rule to do this.
I recommend you leave it at the default level and see what you catch
before raising the score.

uri IE_ADDRESS_SPOOF_EXPLOIT  /^https?\:\/\/[^\/\s].*%0[1|0]@/
describe IE_ADDRESS_SPOOF_EXPLOIT       Message contains IE address spoof
score IE_ADDRESS_SPOOF_EXPLOIT .01

You can see the regexp match by putting these items in a file and running
this from the command line against a file:

perl -ne 'print if s/(https?\:\/\/[^\/\s].*%0[1|0]@)/$1/' /tmp/test.txt


Thanks for everyone who posted up other versions of this rule, which I
based this rule off of.


-- 
Luke Computer Science System Administrator
Security Administrator,College of Engineering
Montana State University-Bozeman,Montana



-------------------------------------------------------
The SF.Net email is sponsored by EclipseCon 2004
Premiere Conference on Open Tools Development and Integration
See the breadth of Eclipse activity. February 3-5 in Anaheim, CA.
http://www.eclipsecon.org/osdn
_______________________________________________
Spamassassin-talk mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/spamassassin-talk

Reply via email to