EXPLOIT-KIT -- Snort has alerted on traffic that is typical of known exploit kits. Exploit kits are pre-packaged sets of code and malware geared toward finding and taking advantage of common browser vulnerabilities. They are Javascript code that provides an entry point to a system to initiate the next state. Snort's rules look for known exploit kit nomenclature, information sent back exposing sensitive infrastructure, attempts to reach a certain file, etc. Rules try to identify the exact kit being used based on actor-group patterns, such as favored target website, malware types, and code similarities.
EXPLOIT-KIT Gong Da exploit kit landing page
Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2135, CVE-2011-2417, and CVE-2011-2425. Impact: CVSS base score 10.0 CVSS impact score 10.0 CVSS exploitability score 10.0 confidentialityImpact COMPLETE integrityImpact COMPLETE availabilityImpact COMPLETE Details: Ease of Attack:
No information provided
No public information
No known false positives
Talos research team. This document was generated from data supplied by the national vulnerability database, a product of the national institute of standards and technology. For more information see [nvd].
No rule groups
CVE-2011-2140 |
Loading description
|
CVE-2011-3544 |
Loading description
|
CVE-2012-0003 |
Loading description
|
CVE-2012-0507 |
Loading description
|
CVE-2012-0634 |
Loading description
|
CVE-2012-1723 |
Loading description
|
CVE-2012-1889 |
Loading description
|
CVE-2012-4681 |
Loading description
|
CVE-2012-4792 |
Loading description
|
CVE-2012-4969 |
Loading description
|
CVE-2012-5076 |
Loading description
|
CVE-2013-1493 |
Loading description
|
CVE-2011-2135 |
Loading description
|