Anyone know if you can utilize SmartDefense to catch an HTTP session with a
vulnerable JPEG.



I found some snort rules that allows Snort to detect for the Proof of
Concept Code.  However it is prone to false positives, but given the
possible outbreak, I'd be willing to deal with that.



Content-Type:image/jpeg; content:"|FF FE 00 01|" or "|FF FE 00 00|"



Thanks,



Derek O'Flynn


=================================================
To set vacation, Out-Of-Office, or away messages,
send an email to [EMAIL PROTECTED]
in the BODY of the email add:
set fw-1-mailinglist nomail
=================================================
To unsubscribe from this mailing list,
please see the instructions at
http://www.checkpoint.com/services/mailing.html
=================================================
If you have any questions on how to change your
subscription options, email
[EMAIL PROTECTED]
=================================================

Reply via email to