代码拉取完成,页面将自动刷新
同步操作将从 looking-for-vest/Urgent11-Suricata-LUA-scripts 强制同步,此操作会覆盖自 Fork 仓库以来所做的任何修改,且无法恢复!!!
确定后同步将在后台操作,完成时将刷新页面,请耐心等待。
--[[
-- Author: Axel Boesenach
--
-- TCP-Options Field parser for Suricata to check for CVE-2019-12260
--
-- Suricata rule keyword
-- luajit:cve_2019_12260.lua;
--
-- Suricata rule
-- alert ip any any -> any any (
-- msg:"EXPLOIT - VxWorks CVE-2019-12260 Malformed TCP-AO Detected";
-- flow:to_server;
-- flags:S;
-- luajit:cve_2019_12260.lua;
-- threshold:type limit, track by_src, count 1, seconds 3600;
-- classtype:attempted-admin;
-- reference:url,armis.com/urgent11/;
-- metadata:created_at 2019-11-06;
-- metadata:CVE 2019-12260;
-- sid:3;
-- rev:1;
-- )
--
-- The script checks for CVE-2019-12260, the packet that is checked consists of a malformed SYN packet,
-- this packet contains a TCP-AO option field with a byte value of <= 3 bytes. The TCP-AO option can be
-- set with hex value 0x29, as per RFC: https://tools.ietf.org/html/rfc5925#page-7
]]
-- Initialize the script
function init (args)
local needs = {}
needs["packet"] = tostring(true)
return needs
end
-- Try and match the condition
function match (args)
for index, data in pairs(args) do
--[[
-- The exploit is based on malforming the TCP-AO option by setting it to anything that is less than
-- or equal to 3 bytes. This can be checked by verifying that hex value 0x29 is set as an option at
-- offset 56
]]
if string.byte(data, 57) == 29 and string.byte(data, 58) < 4 then
return 1
end
end
return 0
end
此处可能存在不合适展示的内容,页面不予展示。您可通过相关编辑功能自查并修改。
如您确认内容无涉及 不当用语 / 纯广告导流 / 暴力 / 低俗色情 / 侵权 / 盗版 / 虚假 / 无价值内容或违法国家有关法律法规的内容,可点击提交进行申诉,我们将尽快为您处理。