[Emerging-Sigs] Signature for Bash Exploit?

Jeremy Hoel jthoel at gmail.com
Thu Sep 25 19:58:41 EDT 2014


I forgot to check for disabled ones.. the rules file i normally look at
removes all the commented ones out.  good point.

On Thu, Sep 25, 2014 at 11:56 PM, Francis Trudeau <
ftrudeau at emergingthreats.net> wrote:

> There was a lot of them created over the past couple days.  They are
> all in OPEN so they should be widespread.
>
> 37 in total went out, with 30 of them being generic url-encode rules
> that are disabled by default.
>
> Thanks,
>
> Francis
>
>
>
> On Thu, Sep 25, 2014 at 5:47 PM, Leonard Jacobs <ljacobs at netsecuris.com>
> wrote:
> > Was a signature created for the Bash exploit?
> >
> >
> >
> > Thanks.
> >
> >
> >
> > Leonard
> >
> >
> >
> >
> > _______________________________________________
> > Emerging-sigs mailing list
> > Emerging-sigs at lists.emergingthreats.net
> > https://lists.emergingthreats.net/mailman/listinfo/emerging-sigs
> >
> > Support Emerging Threats! Subscribe to Emerging Threats Pro
> > http://www.emergingthreats.net
> >
> >
> _______________________________________________
> Emerging-sigs mailing list
> Emerging-sigs at lists.emergingthreats.net
> https://lists.emergingthreats.net/mailman/listinfo/emerging-sigs
>
> Support Emerging Threats! Subscribe to Emerging Threats Pro
> http://www.emergingthreats.net
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.emergingthreats.net/pipermail/emerging-sigs/attachments/20140925/da7db912/attachment.html>


More information about the Emerging-sigs mailing list