Short Name |
SHELLCODE:MSF:DCX86-80S |
---|---|
Severity |
Critical |
Recommended |
Yes |
Recommended Action |
Drop |
Category |
SHELLCODE |
Keywords |
Metasploit Decoder Routine for X86 HTTP-STC |
Release Date |
2013/09/30 |
Update Number |
2303 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detect payloads being transferred over HTTP protocol that have been encoded using Metasploit X86 encoder routine. This could be an indication that the session is an attack coming from a Metasploit attacker.
BACnet OPC Client is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. An attacker can exploit this issue to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions.