Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

HTTP:EXPLOIT:EXP-MALICOUS-FILE

Severity

Major

Recommended

No

Recommended Action

Drop

Category

HTTP

Keywords

Suspicious File Download Attempt

Release Date

2016/08/31

Update Number

2774

Supported Platforms

idp-4.1+, isg-3.5.141818+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

HTTP: Suspicious File Download Attempt


This signature detects users downloading malformed suspicious files through HTTP. A successful exploit can result in a denial-of-service condition or remote code execution.

Extended Description

Per: http://www.microsoft.com/technet/security/advisory/2286198.mspx Microsoft has completed the investigation into a public report of this vulnerability. We have issued MS10-046 to address this issue. http://www.microsoft.com/technet/security/bulletin/MS10-046.mspx

Affected Products

  • Microsoft windows_2003_server *
  • Microsoft windows_7 -
  • Microsoft windows_server_2003 *
  • Microsoft windows_server_2008 -
  • Microsoft windows_server_2008 *
  • Microsoft windows_server_2008 r2
  • Microsoft windows_vista -
  • Microsoft windows_vista *
  • Microsoft windows_xp -
  • Microsoft windows_xp *

References

  • CVE: CVE-2015-7089
  • CVE: CVE-2016-1515
  • CVE: CVE-2009-1605
  • CVE: CVE-2009-1792
  • CVE: CVE-2010-4010
  • CVE: CVE-2015-7088
  • CVE: CVE-2015-8396
  • CVE: CVE-2016-2210
  • CVE: CVE-2010-2568
  • CVE: CVE-2014-4148

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out