Short Name |
MS-RPC:EVASION:BUFFERED-REQUEST |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
MS-RPC |
Keywords |
msrpc evasion buffer request WRITE&REQUEST |
Release Date |
2009/05/28 |
Update Number |
1434 |
Supported Platforms |
idp-4.0 - idp-5.0, isg-3.0+ |
This signature detects packets containing known evasion techniques that affect the SMB, DCE RPC, and MS RPC protocols. These packets should not be seen in normal traffic and indicate attempts to evade network defense systems by sending invalid, out of order, or heavily fragmented communication. Due to potential false-positives in some older MS-RPC services, this signature should only be used to inspect traffic going to and from the Internet on WAN links. This signature should NOT be used to monitor traffic between internal servers/clients on a LAN or inter-office WAN.
Successful exploitation would allow an attacker to bypass the intrusion detection system and access the vulnerable machine in a network. As a result of this, the attacker can completely compromise the vulnerable system, depending on the severity of the vulnerability being exploited.