FILE-OFFICE -- Snort detected traffic targeting vulnerabilities in files belonging to the Microsoft Office suite of software (Excel, PowerPoint, Word, Visio, Access, Outlook, etc.).
FILE-OFFICE Microsoft Office remote code execution attempt
This rule looks for specially crafted files known to exploit a remote code execution vulnerability in Microsoft Office.
This rule alerts when Snort detects attempts to exploit a remote code execution vulnerability in Microsoft Office.
No public information
No known false positives
Cisco Talos Intelligence Group
Rule Categories::File::Office
MITRE::ATT&CK Framework::Enterprise::Initial Access::Phishing
MITRE::ATT&CK Framework::Enterprise::Execution::User Execution::Malicious File
MITRE::ATT&CK Framework::Enterprise::Lateral Movement::Remote Services::SMB/Windows Admin Shares
Memory Corruption
Memory Corruption is any vulnerability that allows the modification of the content of memory locations in a way not intended by the developer. Memory corruption results are inconsistent; they could lead to fatal errors and system crashes or data leakage; some have no effect at all.
CVE-2024-38021 |
Loading description
|