# Copyright 2001-2019 Sourcefire, Inc. All Rights Reserved. # # This file contains (i) proprietary rules that were created, tested and certified by # Sourcefire, Inc. (the "VRT Certified Rules") that are distributed under the VRT # Certified Rules License Agreement (v 2.0), and (ii) rules that were created by # Sourcefire and other third parties (the "GPL Rules") that are distributed under the # GNU General Public License (GPL), v2. # # The VRT Certified Rules are owned by Sourcefire, Inc. The GPL Rules were created # by Sourcefire and other third parties. The GPL Rules created by Sourcefire are # owned by Sourcefire, Inc., and the GPL Rules not created by Sourcefire are owned by # their respective creators. Please see http://www.snort.org/snort/snort-team/ for a # list of third party owners and their respective copyrights. # # In order to determine what rules are VRT Certified Rules or GPL Rules, please refer # to the VRT Certified Rules License Agreement (v2.0). # #------------------- # FILE-OFFICE RULES #------------------- # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel malformed CellXF memory corruption attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|E0 00 14 00|"; byte_test:2,<=,0x3FE,0,relative,little; byte_test:2,<=,0x188,2,relative,little; byte_test:1,!&,0x20,4,relative; content:!"|FF|"; within:1; distance:7; byte_test:1,>,0xB5,7,relative; metadata:policy max-detect-ips drop, policy security-ips drop, service smtp; reference:cve,2017-0027; reference:url,technet.microsoft.com/en-us/security/bulletin/MS17-014; classtype:attempted-user; sid:41582; rev:5;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel malformed CellXF memory corruption attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|E0 00 14 00|"; byte_test:2,<=,0x3FE,0,relative,little; byte_test:2,<=,0x188,2,relative,little; byte_test:1,!&,0x20,4,relative; content:!"|FF|"; within:1; distance:7; byte_test:1,>,0xB5,7,relative; metadata:policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2017-0027; reference:url,technet.microsoft.com/en-us/security/bulletin/MS17-014; classtype:attempted-user; sid:41581; rev:5;) alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office RTF footnote format use after free attempt"; flow:to_server,established; flowbits:isset,file.rtf; file_data; content:"|5C|rtlch"; nocase; content:"|5C|fcs1"; within:50; nocase; content:!"|5C|af"; within:50; nocase; content:"|5C|ltrch"; within:50; nocase; content:!"|5C|fcs"; within:50; nocase; content:"|5C|chftnsep"; within:50; nocase; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service smtp; reference:cve,2017-0019; reference:url,technet.microsoft.com/en-us/security/bulletin/MS17-014; classtype:attempted-user; sid:41578; rev:4;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office RTF footnote format use after free attempt"; flow:to_client,established; flowbits:isset,file.rtf; file_data; content:"|5C|rtlch"; nocase; content:"|5C|fcs1"; within:50; nocase; content:!"|5C|af"; within:50; nocase; content:"|5C|ltrch"; within:50; nocase; content:!"|5C|fcs"; within:50; nocase; content:"|5C|chftnsep"; within:50; nocase; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2017-0019; reference:url,technet.microsoft.com/en-us/security/bulletin/MS17-014; classtype:attempted-user; sid:41577; rev:4;) alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel xlsb use-after-free attempt"; flow:to_server,established; file_data; content:"|10 49 66 65 56 CA 50 89 08 A1 12 49 89 D4 57 9D D3 71 ED EF FF F9 F6 7B D6 3A 6B E9 D4 CA BB 0F|"; fast_pattern:only; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service smtp; reference:cve,2017-0020; reference:url,technet.microsoft.com/en-us/security/bulletin/MS17-014; classtype:attempted-user; sid:41566; rev:4;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel xlsb use-after-free attempt"; flow:to_client,established; file_data; content:"|10 49 66 65 56 CA 50 89 08 A1 12 49 89 D4 57 9D D3 71 ED EF FF F9 F6 7B D6 3A 6B E9 D4 CA BB 0F|"; fast_pattern:only; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2017-0020; reference:url,technet.microsoft.com/en-us/security/bulletin/MS17-014; classtype:attempted-user; sid:41565; rev:4;) # alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"FILE-OFFICE Microsoft Office imjp12k.dll dll-load exploit attempt"; flow:to_server,established; content:"/imjp12k.dll"; fast_pattern:only; http_uri; metadata:service http; reference:cve,2017-0039; reference:url,attack.mitre.org/techniques/T1038; reference:url,attack.mitre.org/techniques/T1129; reference:url,attack.mitre.org/techniques/T1157; reference:url,technet.microsoft.com/en-us/security/bulletin/MS17-012; classtype:attempted-user; sid:41564; rev:4;) # alert tcp $HOME_NET any -> $HOME_NET [139,445] (msg:"FILE-OFFICE Microsoft Office request for imjp12k.dll over SMB attempt"; flow:to_server,established; content:"|FF|SMB|A2 00 00 00 00|"; depth:9; offset:4; content:"i|00|m|00|j|00|p|00|1|00|2|00|k|00|.|00|d|00|l|00|l|00 00 00|"; fast_pattern:only; metadata:service netbios-ssn; reference:cve,2017-0039; reference:url,technet.microsoft.com/en-us/security/bulletin/MS17-012; classtype:attempted-user; sid:41563; rev:4;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Works 4.x converter font name buffer overflow attempt"; flow:to_client,established; flowbits:isset,file.works; file_data; content:"Timesffffffffff|01 10 12|fffff ffffffffffff|02 00 FF|fffff fffffffffffff|03 10 15|fffffffffffffffffffff|04 10 13|fffffffffffffffffffffffffffffffffffffffffffff|29 06 10 18|ffffffffffffffffffffffff|07 10 16|ffffffffffffffffffffff|08 10 1C|ffffffffffffffffffffffffffff|00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2009-1533; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-024; classtype:attempted-user; sid:15526; rev:13;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office WordPad and Office Text Converters XST parsing buffer overflow attempt"; flow:to_client,established; file_data; content:"|01 00 90|hNIr|8F 1E 23 FF 0F FF 0F FF 0F FF 0F FF 0F FF 0F FF 0F FF 0F FF 0F 00 00 01 00 00 00 00 00 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0D 10 00 00 0F 84|h|01 11 84 98 FE|^|84|h|01|`|84 98 FE|o|28 00 87|h|00 00 00 00 88|H|00 00|BB"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2008-4841; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-010; classtype:attempted-user; sid:15455; rev:9;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word Converter XST structure buffer overflow attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|5F B3 AC 33 42 1E DA DE 51 CA FA 0D 4F 71 3C 4B BE EC 72 87 2B 4D 06 22 A7 4C 49 75 6A E0 37 20 BB 29 CB A9 2E|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2008-4841; reference:url,technet.microsoft.com/en-us/security/bulletin/ms09-010; classtype:attempted-user; sid:17406; rev:10;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word Converter XST structure buffer overflow attempt"; flow:to_client,established; file_data; content:"|00 00 0D 10 00 00 0F 84 D0 02 11 84 98 FE 5E 84 D0 02 60 84 98 FE 6F 28 00 87 68 00 00 00 00 88 48 00 00 1F 05|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2008-4841; reference:url,technet.microsoft.com/en-us/security/bulletin/ms09-010; classtype:attempted-user; sid:17405; rev:11;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel SLK file excessive Picture records exploit attempt"; flow:to_client,established; flowbits:isset,file.slk; file_data; content:"|0D 0A|P|3B|FABC"; content:"|0D 0A|P|3B|FABC"; distance:0; content:"|0D 0A|P|3B|FABC"; distance:0; content:"|0D 0A|P|3B|FABC"; distance:0; content:"|0D 0A|P|3B|FABC"; distance:0; content:"|0D 0A|P|3B|FABC"; distance:0; pcre:"/(\x0d\x0aP\x3bFABC\d{3}){200}/i"; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2011-1276; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-045; classtype:attempted-user; sid:19229; rev:11;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel ObjBiff exploit attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|5D 00|"; content:"|00 14|"; within:8; content:"|00 01 06 00 00|"; within:55; byte_test:1,!=,0x02,0,relative,little; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2011-1272; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-045; classtype:attempted-user; sid:19200; rev:12;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel GhostRw record exploit attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|20 00 05 19 40 00 01 1E 01 00 19 40 00 01 03 1F 00 00 00 00 00 00 10 41 1E 00 04 05 19 40 00 01 1E 01 00 19 40 00 01 03 1E 10 00 1E 00 01 05 19 40|"; fast_pattern:only; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2010-3242; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-080; classtype:attempted-user; sid:17763; rev:11;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word unchecked index value remote code execution attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|E0 10 11 84 00 00 15 C6 05 00 01 48 12 06 5E 84 E0 10 60 84 00 00 6F 28 00 87 68 00 00 00 00 88|"; fast_pattern:only; content:"|0F 84 1C 11 11 84 4C FF 15 C6 05 00 01 1C 11 06|"; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2010-3219; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-079; classtype:attempted-user; sid:17755; rev:13;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word bookmark bound check remote code execution attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|00 00 62 00 00 00 75 00 00 00 7E 00 00 00 8A 00 00 00 02 00 00 00 02 00 00 00 00 00 02 00 01|"; fast_pattern:only; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2010-3216; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-079; classtype:attempted-user; sid:17754; rev:12;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Visio improper attribute code execution attempt"; flow:to_client,established; flowbits:isset,file.visio; file_data; content:"|19 00 1A 00 1B 00 1C 00 1D 00 1E 00 1F 00| |00|h|00 00 00 02|U|00 00 F8 00 00 00 00 00 00 00|@"; fast_pattern:only; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2010-0254; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-028; classtype:attempted-user; sid:16535; rev:12;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Visio off-by-one in array index code execution attempt"; flow:to_client,established; flowbits:isset,file.visio; file_data; content:"h|00 07 00 01|T|00 00 C8 01 00 00 00 00 00 00|I|00 00 00 00 00 00 F0|?A|00 00 00 00 00 00 E0|?A|00 00 00 00 00 00 B0|?A|00 00 00 00 00 00 B0 BF|"; fast_pattern:only; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2010-0256; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-028; classtype:attempted-user; sid:16536; rev:12;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Project file parsing arbitrary memory access attempt"; flow:to_client,established; file_data; content:"|94|!|00 00 14 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 0A 00 00 00|V|00|@|03| |00 00 00 03 00 04 00 00 00 00 00 00 00 00 00 04 00 00 00 0A 00 00 00 17 00|@|0B| |00 00 00 03 00 04 00 00 00 00 00|"; fast_pattern:only; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2009-0102; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-074; classtype:attempted-user; sid:16328; rev:12;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Windows WordPad and Office text converter integer overflow attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|C0 00 00 00 16 00 00 00 C8 00 00 00 0D 00 00 00 D0 00 00 00 0C 00 00 00 E1 00 00 00|"; byte_test:4,>,357913941,0,relative,little; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2009-2506; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-073; classtype:attempted-user; sid:16314; rev:10;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel GDI+ Office Art Property Table remote code execution attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"3|01 0B F0 8C 02 00 00 7F 00 08 00 08 00|E|C1 A8 01 00 00|F|C1 1C 00 00 00|Q|C1|&|00 00 00|U|C1 00 00 00 00|V|C1 00 00 00 00|W|C1 16 00 00 00|V|00|AAAA"; fast_pattern:only; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2009-2528; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-062; classtype:attempted-user; sid:16178; rev:11;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word remote code execution attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|00 00 0D 0A 11|h|01 13 98 FE 0C|4|00 FF 8F 08 00 00 FF FF|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2009-0565; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-027; classtype:attempted-user; sid:15525; rev:13;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word GDI+ Office Art Property Table remote code execution attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"c|00 0B F0 24 00 00 00 7F 00 04 00 04 00|X|01 00 00 00 00|V|00|AAAA"; fast_pattern:only; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2009-2528; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-062; classtype:attempted-user; sid:16177; rev:11;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word remote code execution attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|00 00 E9 62 F9 FF FF 13 98 FE 0C|4|00 FF 8F FF E7 40 40 40|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2009-0565; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-027; classtype:attempted-user; sid:17691; rev:11;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel oversized ptgFuncVar cparams value buffer overflow attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|06 00|J|00|"; content:"|03 1E 0A 00|B|04|G|00|"; within:8; distance:66; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2009-3132; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-067; classtype:attempted-user; sid:16233; rev:11;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel ptg index parsing code execution attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|06 00 05 1E 02 00 1E 03 00 05 1E 04 00 05 1E 05 00 05 1E 06 00 05 1E 03 00 1E 04 00|B|04|G|00 D7 00 06 00|"; fast_pattern:only; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2009-3132; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-067; classtype:attempted-user; sid:16553; rev:10;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel integer field in row record improper validation remote code execution attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|08 00|P|00 00 FF 00 00 0A AA|A|8D 86 84|7|0E FF FF 00 00 00 00 00 FE 0D|"; fast_pattern:only; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2009-3130; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-067; classtype:attempted-user; sid:16226; rev:10;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel file SXDB record exploit attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|C6 00 1A 00|2|00 00 00 01 00|!|00 FF 07 FE FF 04 00|"; fast_pattern:only; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2009-3127; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-067; classtype:attempted-user; sid:16235; rev:12;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word .rtf file double free attempt"; flow:to_client,established; file_data; content:"|7B 5C|rtf"; depth:5; content:"|5C|do"; fast_pattern; content:"|5C|do"; within:5; pcre:"/\x5Cdo[\x20\x7D].{0,5}\x5Cdo[\x20\x7D]/i"; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2008-4027; reference:url,technet.microsoft.com/en-us/security/bulletin/MS08-072; classtype:attempted-user; sid:15083; rev:14;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel file Window/Pane record exploit attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:">|02 12 00 B6 06 00 00 00 00|@|00 00 00 00 00 00 00 00 00 00 00 1D 00 0F 00 03 0D 00 03 00 00 00 01 00 0D 00 0D 00 03 03|"; fast_pattern:only; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2009-3133; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-067; classtype:attempted-user; sid:16240; rev:13;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word remote code execution attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|F6 03 00 00 FF 7F 12 D6 FC 12 D6 FC|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2009-0563; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-027; classtype:attempted-user; sid:15524; rev:13;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office PowerPoint with embedded Flash file attachment"; flow:to_server,established; flowbits:isset,file.ppt; file_data; content:"S|00|h|00|o|00|c|00|k|00|w|00|a|00|v|00|e|00| F|00|l|00|a|00|s|00|h O|00|b|00|j|00|e|00|c|00|t|00|"; fast_pattern:only; metadata:service smtp; classtype:attempted-user; sid:18550; rev:14;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel with embedded Flash file attachment attempt"; flow:to_server,established; flowbits:isset,file.xls; content:"RldTC"; fast_pattern:only; pcre:"/RldTC[ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuv][A-Za-z0-9\\x2b\x2f][A-Za-z0-9\\x2b\x2f]/"; metadata:service smtp; classtype:attempted-user; sid:19067; rev:7;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel with embedded Flash file attachment attempt"; flow:to_server,established; flowbits:isset,file.xls; content:"Q1dTC"; fast_pattern:only; pcre:"/Q1dTC[ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuv][A-Za-z0-9\\x2b\x2f][A-Za-z0-9\\x2b\x2f]/"; metadata:service smtp; classtype:attempted-user; sid:19070; rev:7;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel with embedded Flash file attachment attempt"; flow:to_server,established; flowbits:isset,file.xls; content:"DV1M"; fast_pattern:only; pcre:"/[A-Za-z0-9\\x2b\x2f][A-Za-z0-9\\x2b\x2f][BFJNRVZdhlptx159]DV1M[IJK]/"; metadata:service smtp; classtype:attempted-user; sid:19068; rev:7;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel with embedded Flash file attachment attempt"; flow:to_server,established; flowbits:isset,file.xls; content:"NXUw"; fast_pattern:only; pcre:"/[A-Za-z0-9\\x2b\x2f][EUk0]NXUw[ghijklmnopqr][A-Za-z0-9\\x2b\x2f]/"; metadata:service smtp; classtype:attempted-user; sid:19069; rev:7;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word document with embedded TrueType font"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|EC A5 C1 00|"; isdataat:646,relative; content:!"|00 00 00 00 00 00 00 00|"; within:8; distance:638; metadata:service ftp-data, service http, service imap, service pop3; reference:url,msdn.microsoft.com/en-us/library/cc313153(v=office.12).aspx; classtype:policy-violation; sid:20540; rev:9;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word Smart Tags code execution attempt"; flow:to_client,established; flowbits:isset,file.ole; file_data; content:"|EC A5 C1 00|"; depth:4; offset:512; content:"|0E 00|"; within:2; distance:28; content:"|16 00|"; within:2; distance:28; byte_jump:2,-2,relative,little,multiplier 4; pcre:"/^[\xa4\x88\xb7]\x00/R"; byte_test:4,!=,0,920,relative,little; byte_test:4,>,0,924,relative,little; byte_test:4,<,4,924,relative,little; metadata:service ftp-data, service http, service imap, service pop3; reference:bugtraq,18037; reference:cve,2006-2492; reference:url,technet.microsoft.com/en-us/security/bulletin/MS06-027; classtype:attempted-user; sid:21674; rev:4;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word Smart Tags code execution attempt"; flow:to_client,established; flowbits:isset,file.ole; file_data; content:"|00 00 C8 04 00 00 A9 56 00 00 6A 03 00 00 89 29 00 00 00 00 00 00 13 60 00 00 BC 02|"; fast_pattern:only; metadata:service ftp-data, service http, service imap, service pop3; reference:bugtraq,18037; reference:cve,2006-2492; reference:url,technet.microsoft.com/en-us/security/bulletin/MS06-027; classtype:attempted-user; sid:21677; rev:4;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word Smart Tags code execution attempt"; flow:to_client,established; flowbits:isset,file.ole; file_data; content:"|EC A5 C1 00|"; depth:4; offset:512; content:"|0E 00|"; within:2; distance:28; content:"|16 00|"; within:2; distance:28; byte_jump:2,-2,relative,little,multiplier 4; pcre:"/^[\xa4\x88\xb7]\x00/R"; byte_test:4,>,0x1000,920,relative,little; byte_extract:4,920,fcPlcBkfFactoid,relative,little; byte_test:4,<,fcPlcBkfFactoid,12,relative,little; metadata:service ftp-data, service http, service imap, service pop3; reference:bugtraq,18037; reference:cve,2006-2492; reference:url,technet.microsoft.com/en-us/security/bulletin/MS06-027; classtype:attempted-user; sid:21675; rev:4;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word Smart Tags code execution attempt"; flow:to_client,established; flowbits:isset,file.ole; file_data; content:"|EC A5 C1 00|"; depth:4; offset:512; content:"|0E 00|"; within:2; distance:28; content:"|16 00|"; within:2; distance:28; byte_jump:2,-2,relative,little,multiplier 4; pcre:"/^[\xa4\x88\xb7]\x00/R"; byte_test:4,!=,0,920,relative,little; byte_test:4,>,0x1000,924,relative,little; metadata:service ftp-data, service http, service imap, service pop3; reference:bugtraq,18037; reference:cve,2006-2492; reference:url,technet.microsoft.com/en-us/security/bulletin/MS06-027; classtype:attempted-user; sid:21676; rev:4;) # alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"FILE-OFFICE Microsoft Office pptimpconv.dll dll-load exploit attempt"; flow:to_server,established; content:"|2F|pptimpconv.dll"; nocase; http_uri; metadata:service http; reference:cve,2010-3337; reference:url,attack.mitre.org/techniques/T1038; reference:url,attack.mitre.org/techniques/T1129; reference:url,attack.mitre.org/techniques/T1157; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-087; classtype:attempted-user; sid:18071; rev:12;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel Lbl record stack overflow attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|18 00|"; byte_test:1,>,0x7f,5,relative; content:"|00 00|"; within:2; distance:7; content:"|00 00 00 00|"; within:4; distance:2; byte_jump:2,-15,relative,little; pcre:"/^([\x18\xDE\x19\xEB\xFC\xFF]\x00|[\x94\x99\x93\x13\x66]\x08|\xC1\x01)/R"; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2010-1251; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-038; classtype:attempted-user; sid:16655; rev:15;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word unicode parsing buffer overflow attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|AA AA AA AA AA AA AA AA AA AA|"; content:"|F0 12 BF 00 00 00 00 00 00 10 00 00 00 00 00 06 00 00 01 08 00 00 0E 00 62 6A 62 6A AC 9B AC 9B|"; fast_pattern:only; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2004-0963; reference:url,technet.microsoft.com/en-us/security/bulletin/ms05-023; classtype:attempted-user; sid:21764; rev:4;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Works 9 and Word 12 converter heap overflow attempt"; flow:to_client,established; flowbits:isset,file.ole; file_data; content:"CHNKWKS "; content:"|F8 01|"; within:2; distance:16; byte_test:2,>,0x18,6,relative; content:!"|18 00|"; within:2; distance:6; metadata:policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-0177; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-028; classtype:attempted-user; sid:21794; rev:8;) # alert tcp $HOME_NET any -> $HOME_NET [139,445] (msg:"FILE-OFFICE Microsoft Office pptimpconv.dll dll-load exploit attempt"; flow:to_server,established; content:"p|00|p|00|t|00|i|00|m|00|p|00|c|00|o|00|n|00|v|00|.|00|d|00|l|00|l|00|"; fast_pattern:only; metadata:service netbios-ssn; reference:cve,2010-3337; reference:url,attack.mitre.org/techniques/T1038; reference:url,attack.mitre.org/techniques/T1129; reference:url,attack.mitre.org/techniques/T1157; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-087; classtype:attempted-user; sid:18070; rev:13;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office PowerPoint OfficeArt atom memory corruption attempt"; flow:to_client,established; flowbits:isset,file.ppt; file_data; content:"|D0 CF 11 E0 A1 B1 1A E1|"; depth:8; content:"P|00|o|00|w|00|e|00|r|00|P|00|o|00|i|00|n|00|t|00 20 00|D|00|o|00|c|00|u|00|m|00|e|00|n|00|t|00|"; nocase; content:"|00 00 00 00 0A 04 04 00 00 00|"; byte_extract:4,0,ref,little,relative; content:"|00 00 00 00 C1 0B|"; byte_test:4,>,4,0,little,relative; byte_test:4,=,ref,4,little,relative; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2011-0976; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-022; classtype:attempted-admin; sid:18637; rev:14;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Outlook Saved Search download attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"S|00|a|00|v|00|e|00|d|00|S|00|e|00|a|00|r|00|c|00|h|00|"; fast_pattern:only; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2007-0034; reference:url,technet.microsoft.com/en-us/security/bulletin/MS07-003; classtype:attempted-user; sid:9847; rev:14;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office BMP header biClrUsed integer overflow attempt"; flow:to_client,established; flowbits:isset,file.bmp; file_data; content:"BM"; fast_pattern; content:"|00 00 00 00|"; within:4; distance:4; byte_test:4,>,536870911,36,relative,little; metadata:service ftp-data, service http, service imap, service pop3; reference:bugtraq,36651; reference:cve,2009-2518; classtype:attempted-admin; sid:16361; rev:9;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office PowerPoint MCAtom remote code execution attempt"; flow:to_client,established; flowbits:isset,file.ppt; file_data; content:"|F9 0F 04 00 00 00|"; byte_test:4,>,2147483646,0,relative,little; metadata:service ftp-data, service http, service imap, service pop3; reference:bugtraq,20495; reference:cve,2006-5296; classtype:attempted-user; sid:17320; rev:11;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office PowerPoint MCAtom remote code execution attempt"; flow:to_client,established; flowbits:isset,file.ppt; file_data; content:"|FA 0F 04 00 00 00|"; byte_test:4,>,2147483646,0,relative,little; metadata:service ftp-data, service http, service imap, service pop3; reference:bugtraq,20495; reference:cve,2006-5296; classtype:attempted-user; sid:17319; rev:11;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word formatted disk pages table memory corruption attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|D0 CF 11 E0 A1 B1 1A E1|"; content:"|EC A5|"; within:2; distance:504; byte_test:4,>,0xFFFF,114,relative,little; content:"|00 00 00 00|"; within:4; distance:12; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,21589; reference:cve,2006-6561; classtype:attempted-user; sid:17505; rev:13;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word formatted disk pages table memory corruption attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|D0 CF 11 E0 A1 B1 1A E1|"; content:"|EC A5|"; within:2; distance:504; byte_test:4,>,0xFFFF,138,relative,little; content:"|00 00 00 00|"; within:4; distance:12; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,21589; reference:cve,2006-6561; classtype:attempted-user; sid:17507; rev:13;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office PowerPoint Legacy file format picture object code execution attempt"; flow:to_client,established; flowbits:isset,file.ppt; file_data; content:"|FF 03 00 00 00 60 16 8F 10 00 00 00 00 5F 07 90 08 28 00 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,34834; reference:cve,2009-0223; classtype:attempted-user; sid:17646; rev:9;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office GIF image descriptor memory corruption attempt"; flow:to_client,established; file_data; content:"GIF8"; depth:4; content:"a"; within:1; distance:1; byte_test:1,!&,0x80,4,relative; pcre:"/^.{7}\x2C.{5}([\xE0-\xFF]|.{2}[\xE0-\xFF])/sR"; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,18915; reference:bugtraq,22630; reference:cve,2006-0007; reference:cve,2007-1071; reference:url,technet.microsoft.com/en-us/security/bulletin/ms06-039; classtype:attempted-user; sid:17664; rev:11;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel Series record exploit attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|03 10 0C 00|"; content:"|00 01 00|"; within:3; distance:1; byte_test:1,&,0x80,1,relative,little; content:"|33 10 00 00|"; within:4; distance:8; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2011-1278; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-045; classtype:attempted-user; sid:19231; rev:13;) # alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"FILE-OFFICE Microsoft Office Visio mfc71 dll-load exploit attempt"; flow:to_server,established; content:"|2F|mfc71"; fast_pattern; nocase; http_uri; content:".dll"; within:7; nocase; http_uri; metadata:service http; reference:cve,2010-3148; reference:url,attack.mitre.org/techniques/T1038; reference:url,attack.mitre.org/techniques/T1129; reference:url,attack.mitre.org/techniques/T1157; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-055; classtype:attempted-user; sid:19466; rev:11;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel RealTimeData record memory corruption attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|13 08|"; fast_pattern; content:!"|00 00|"; within:2; byte_extract:2,0,size_of_record,relative,little; content:"|00 00 00 00|"; within:4; distance:12; byte_test:4,>,size_of_record,0,relative,little; content:"|00|"; within:1; distance:2; metadata:policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2011-0101; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-021; classtype:attempted-user; sid:18633; rev:13;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel Workspace file FontCount record memory corruption attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|09 04 06 00 00 04 00 01|"; content:"|30 00|"; distance:0; byte_test:2,>,2,0,relative,little; content:"|00 00|"; within:2; distance:2; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2011-0103; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-021; classtype:attempted-user; sid:18634; rev:14;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Publisher oversized oti length attempt"; flow:to_client,established; flowbits:isset,file.pub; file_data; content:"|E8 AC|"; content:"|2C 01 04 00|"; within:4; distance:2; byte_test:2,>,94,26,relative,little; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2010-3955; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-103; classtype:attempted-user; sid:18231; rev:12;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office PowerPoint file LinkedSlide10Atom record parsing heap corruption attempt"; flow:to_client,established; flowbits:isset,file.ppt; file_data; content:"|00 00 E7|.|08 00 00 00|"; byte_jump:4,4,relative,multiplier 16,little; content:"|00 00 E6|.|08 00 00 00|"; within:8; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2010-0030; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-004; classtype:attempted-user; sid:16410; rev:11;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel file SxView record exploit attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|B0 00|"; byte_test:2,>,44,0,relative,little; byte_test:2,<,8225,0,relative,little; byte_test:2,<,11,4,relative,little; byte_test:2,>,10,34,relative,little; byte_jump:2,0,relative,little; pcre:"/^[\xB1\xB4-\xB6\xC5\xF1]\x00/R"; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2009-3128; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-067; classtype:attempted-user; sid:16236; rev:13;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office PowerPoint ParaBuildAtom memory corruption attempt"; flow:to_client,established; flowbits:isset,file.ppt; file_data; content:"|01 00 09|+|10 00 00 00|"; pcre:"/\x0f\x00[\x04\x06]\x2B.{1,48}\x01\x00\x09\x2b/sm"; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2009-0224; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-017; classtype:attempted-user; sid:15501; rev:14;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office PowerPoint DiagramBuildContainer memory corruption attempt"; flow:to_client,established; flowbits:isset,file.ppt; file_data; content:"|0F 00 06|+"; pcre:"/.{,48}[\x00\x01]\x00[\x05\x09]\x2B/smR"; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2009-0224; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-017; classtype:attempted-user; sid:15502; rev:14;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Visio invalid ho tag attempt"; flow:to_client,established; flowbits:isset,file.visio; file_data; content:"|0D 14 00 03 00 01 00 16 00 03 00 01 01 02 FF 00 A4 02 A7 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,33660; reference:cve,2009-0096; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-005; classtype:attempted-user; sid:15299; rev:14;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel FeatHdr BIFF record remote code execution attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|67 08|"; content:"|67 08 00 00 00 00 00 00 00 00 04 00|"; within:12; distance:2; content:"|04 00 00 00|"; within:4; distance:1; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2009-3129; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-067; classtype:attempted-user; sid:16241; rev:11;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office WordPad and Office text converters integer underflow attempt"; flow:to_client,established; file_data; content:"|D0 CF 11 E0|"; depth:4; content:"|FE FF|"; depth:2; offset:28; content:"|DC A5|"; byte_test:2,<,4,138,relative,little; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2009-0087; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-010; classtype:attempted-user; sid:15469; rev:17;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word Document remote code execution attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|DC A5|"; byte_test:2,<,38,0,relative,little; byte_test:4,>,0,22,relative,little; byte_test:4,<,250,22,relative,little; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2009-3135; reference:cve,2016-3283; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-068; reference:url,technet.microsoft.com/en-us/security/bulletin/MS16-088; classtype:attempted-user; sid:16234; rev:13;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word Document remote code execution attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|EC A5|"; byte_test:2,<,38,0,relative,little; byte_test:4,>,0,22,relative,little; byte_test:4,<,250,22,relative,little; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2009-3135; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-068; classtype:attempted-user; sid:16586; rev:11;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel oversized ib memory corruption attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|06 00|"; content:"9A|00|A|00|"; within:5; distance:24; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2009-3131; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-067; classtype:attempted-user; sid:16229; rev:13;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office PowerPoint paragraph format array inner header overflow attempt"; flow:to_client,established; flowbits:isset,file.ppt; file_data; content:"|1C 00 00 00 00 80 41 41 41 41 41 41 95 00 FF FF 64|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,34833; reference:cve,2009-0220; classtype:attempted-user; sid:17695; rev:11;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Visio Malformed IconBitsComponent arbitrary code execution attempt"; flow:to_client,established; flowbits:isset,file.visio; file_data; content:"|00 00| |00| |FF 00 00 14 01 00 00 00 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2009-0095; reference:url,technet.microsoft.com/en-us/security/bulletin/ms09-005; classtype:attempted-user; sid:15303; rev:14;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office eps filters memory corruption attempt"; flow:to_client,established; flowbits:isset,file.eps; file_data; content:"%!PS-Adobe-EPSF-3.0"; fast_pattern:only; content:"|C5 D0 D3 C6|"; depth:4; byte_test:2,>,32767,24,relative,little; metadata:service ftp-data, service http, service imap, service pop3; reference:bugtraq,30595; reference:cve,2008-3019; reference:url,technet.microsoft.com/en-us/security/bulletin/MS08-044; classtype:attempted-user; sid:13970; rev:17;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office PowerPoint out of bounds value remote code execution attempt"; flow:to_client,established; flowbits:isset,file.ppt; file_data; content:"|C3 0B 08|"; fast_pattern; byte_test:1,<,0x03,0,relative,little; byte_test:1,>,0x18,7,relative,little; content:"|C3 0B|"; distance:0; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,38104; reference:cve,2010-0032; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-004; classtype:attempted-user; sid:20590; rev:12;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Publisher PLC object memory corruption attempt"; flow:to_client,established; flowbits:isset,file.pub; file_data; content:"|1C 00 04 04|"; byte_test:1,!&,2,14,relative; byte_test:1,=,0,15,relative; byte_extract:2,0,ivfMac,little,relative; byte_test:2,>,ivfMac,10,relative,little; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2011-3412; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-091; classtype:attempted-user; sid:20721; rev:13;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Outlook VEVENT overflow attempt"; flow:to_client,established; file_data; content:"BEGIN|3A|VEVENT"; fast_pattern; nocase; content:"DTSTART|3B|"; distance:0; nocase; pcre:!"/^(VALUE|TZID)/Ri"; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,21931; reference:cve,2007-0033; reference:url,technet.microsoft.com/en-us/security/bulletin/MS07-003; classtype:attempted-user; sid:21163; rev:8;) # alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"FILE-OFFICE Microsoft Office XP URL Handling Buffer Overflow attempt"; flow:to_server,established; content:"|00|"; http_uri; pcre:"/\w{3}\x25\x30\x30[^\r\n]{2000}/Ii"; metadata:policy max-detect-ips drop, service http; reference:bugtraq,12480; reference:cve,2004-0848; classtype:attempted-admin; sid:17568; rev:7;) # alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"FILE-OFFICE Microsoft Office XP URL Handling Buffer Overflow attempt"; flow:to_server,established; content:"GET"; nocase; http_method; content:"%0a"; http_raw_uri; content:"|0A|"; http_uri; pcre:"/\x2e(doc|rtf|xls|ppt)\n[^\r\n]{500}/U"; metadata:policy max-detect-ips drop, service http; reference:bugtraq,12480; reference:cve,2004-0848; classtype:attempted-admin; sid:18284; rev:7;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Publisher 2007 conversion library code execution attempt"; flow:to_client,established; flowbits:isset,file.pub; file_data; content:"|01 00 00 00 FF FF FF 7F 01 00 00 80 01 00 00 00 10 0E FE 7F 01 00 00 00 58 00 7C 96 18 CB 7C 96|"; fast_pattern:only; metadata:service ftp-data, service http, service imap, service pop3; reference:bugtraq,22702; reference:cve,2007-1754; reference:url,technet.microsoft.com/en-us/security/bulletin/MS07-037; classtype:attempted-user; sid:16051; rev:15;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Web Components Spreadsheet ActiveX buffer overflow attempt"; flow:to_client,established; file_data; content:"classid|3D 22|clsid|3A|"; fast_pattern; nocase; content:"0002E51"; distance:0; content:"-0000-0000-C000-000000000046"; within:29; distance:1; pcre:"/0002E51[12]-0000-0000-C000-000000000046\x22/"; content:"
"; distance:0; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,35992; reference:cve,2009-1534; classtype:attempted-user; sid:16786; rev:11;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel unspecified memory corruption attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|00 00 00 00 0C 00 77 30 30 74 77 30 30 74 77 30 30 74 8C 00 04 00 21 00|"; fast_pattern:only; metadata:service ftp-data, service http, service imap, service pop3; reference:bugtraq,15926; classtype:attempted-user; sid:17537; rev:11;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel unspecified memory corruption attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|00 00 00 00 00 0D 10 7E 00 00 00 3B 01 77 00 30 00 30 00 74 00 2C 00 20 00 4D 00 61 00 72 00 63 00 20 00 42 00 65 00 68 00 61 00 72 00 20 00 67 00 69 00 76 00 65 00 73 00 20 00 30 00 2E 00 30 00 31 00 24 00 20 00 62 00 6C 00 6F 00 77 00 6A 00 6F 00 62 00 20 00 61 00 74 00 20 00 65 00 62 00 61 00 79 00 2C 00 20 00 67 00 6F 00 67 00 6F 00 67 00 6F|"; fast_pattern:only; metadata:service ftp-data, service http, service imap, service pop3; reference:bugtraq,15926; classtype:attempted-user; sid:17539; rev:11;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel XF record exploit attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|E0 00 14 00 00 00 00 00 01 00 22 00 00 F0 00 02 00 00 40 00 00 04 09 20 E0 00 14 00 00 00 00 00 01 FD 22 00 00 D0 00 00 00 00 00 00 00 04 09 20|"; fast_pattern:only; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2011-1279; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-045; classtype:attempted-user; sid:19232; rev:12;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel Selection exploit attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|1D 00 0F 00 03 AA CC CC 00 00 00 DD DD AA CC CC|"; fast_pattern:only; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2011-1277; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-045; classtype:attempted-user; sid:19230; rev:12;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel BIFF8 invalid Selection.cref exploit attempt"; flow:to_client,established; file_data; content:"|1D 00 0F 00 03 00 00 00 00 00 00 00 50 00 00 03 00 00 03 EF|"; fast_pattern:only; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2011-1277; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-045; classtype:attempted-user; sid:19261; rev:11;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word STSH record parsing memory corruption"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|6D 00 65 00 6C 00 69 00 6B 00 20 00 32 00 39 00 2E 00 30 00 38 00 2E 00 32 00 30 00 30 00 33 00|"; fast_pattern:only; metadata:service ftp-data, service http, service imap, service pop3; reference:bugtraq,48261; classtype:attempted-user; sid:19607; rev:8;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word STSH record parsing memory corruption"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|00 00 00 00 14 00 0F 00 13 00 01 00 9C 00 0F 00 03 00 00 00 00 00 00 00 00 00 00 40 00 40 F1 FF|"; fast_pattern:only; metadata:service ftp-data, service http, service imap, service pop3; reference:bugtraq,48261; classtype:attempted-user; sid:19606; rev:8;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Visio invalid UMLDTOptions object exploit attempt"; flow:to_client,established; file_data; content:"|7A 0F 8C 0F 28 E8 F3 1E 41 E6 F5 1E ED 24 01 A9 11 76 60 4A|"; fast_pattern:only; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2011-1263; reference:cve,2011-1972; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-060; classtype:attempted-user; sid:19676; rev:11;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office PowerPoint malformed record call to freed object attempt"; flow:to_client,established; flowbits:isset,file.ppt; file_data; content:"|1F 00 44 F1|"; content:"|27 F1|"; within:8; content:"|0F 00 31 F1|"; within:750; content:"|1F 00 32 F1|"; within:750; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2011-0655; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-022; classtype:attempted-admin; sid:19811; rev:13;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel ShrFmla record use after free attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|7E 02 0A 00|"; content:"|06 00|"; within:50; distance:10; byte_jump:2,22,relative,little; content:"|BC 04|"; within:2; content:"|00|"; within:1; distance:8; byte_test:2,>,0x820,-9,relative,little; metadata:service ftp-data, service http, service imap, service pop3; reference:bugtraq,49476; reference:cve,2011-1986; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-072; classtype:attempted-user; sid:20123; rev:14;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel SLK file excessive Picture records exploit attempt"; flow:to_client,established; flowbits:isset,file.slk; file_data; content:"|0A|P|3B|PAAAA"; content:"|0A|P|3B|PAAAA"; distance:0; content:"|0A|P|3B|PAAAA"; distance:0; content:"|0A|P|3B|PAAAA"; distance:0; content:"|0A|P|3B|PAAAA"; distance:0; content:"|0A|P|3B|PAAAA"; distance:0; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2011-1276; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-045; classtype:attempted-user; sid:20049; rev:9;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office BpscBulletProof uninitialized pointer dereference attempt"; flow:to_client,established; file_data; content:"|0F 00 03 18 79 3B 00 00 0F 00 04 F0 48 05 00 00 01 00 09|"; fast_pattern:only; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2011-1982; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-073; classtype:attempted-user; sid:20129; rev:8;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel invalid Lbl record"; flow:to_client,established; file_data; flowbits:isset,file.xls; file_data; content:"|0A 00 73 63 65 6E 5F 75 73 65 72 32 17 01 66 03|"; fast_pattern:only; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2011-1988; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-072; classtype:attempted-user; sid:20126; rev:10;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel invalid Lbl record"; flow:to_client,established; file_data; flowbits:isset,file.xls; file_data; content:"|29 18 00 28 00 00 40 6D 0A 00 73 63 65 6E 5F 6E|"; fast_pattern:only; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2011-1988; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-072; classtype:attempted-user; sid:20125; rev:10;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office PowerPoint SlideAtom record exploit attempt"; flow:to_client,established; flowbits:isset,file.ppt; file_data; content:"|02 00 EF 03 18 00 00 00 07 00 00 00 0D 00 00 00 00 00 00 00 02 00 00 80 5F 01 00 00 07 00 14 30 0F 00 0C 04 A2 03 00 00 0F 00 02|"; fast_pattern:only; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2011-0656; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-022; classtype:attempted-user; sid:18636; rev:13;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Visio deserialization double free attempt"; flow:to_client,established; flowbits:isset,file.visio; file_data; content:"|FF FF FF FF 00 00 BF 8E 22 BD 3E 68 9C 83 00 00 01 00 1D 02|"; fast_pattern:only; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2011-0092; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-008; classtype:attempted-user; sid:18415; rev:12;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Publisher memory corruption attempt"; flow:to_client,established; flowbits:isset,file.pub; file_data; content:"|E8 AC|"; content:"|08 20 E0 AC 01 00 09 C0 6E 00 00 00 41 00 41 00|"; within:16; distance:30; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2010-3954; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-103; classtype:attempted-user; sid:18230; rev:13;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office PowerPoint malformed record call to freed object attempt"; flow:to_client,established; file_data; content:"|1F 00 44 F1|"; content:"|27 F1|"; within:8; content:"|0F 00 31 F1|"; within:750; content:"|1F 00 2C F1|"; within:750; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2011-0655; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-022; classtype:attempted-admin; sid:18635; rev:17;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word Converter sprmTSplit overflow attempt"; flow:to_client,established; file_data; content:"|25 56 00 FF 05 D6 18 04 01 00 00 04 01|"; fast_pattern; content:"|08 D6 1A 00 01 94 FF 2C 22 00 06 98 22|"; within:50; metadata:service ftp-data, service http, service imap, service pop3; reference:bugtraq,47236; reference:cve,2011-0028; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-033; classtype:attempted-user; sid:18642; rev:13;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office TIFFIM32.FLT filter memory corruption attempt"; flow:to_client,established; flowbits:isset,file.tiff; file_data; content:"|01 02 00 03 00 00 FF FF 00 00 0D 00 01 03 00 03 00 00 00 01 00 03 00 00 01 06 00 03 00 00 00 01 00 00 00 00 01 0A 00 03|"; fast_pattern:only; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2010-3949; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-105; classtype:attempted-user; sid:18236; rev:13;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel ADO Object Parsing Code Execution"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|00 00 FE C1 1E 1C 08 00 00 00 00 00 F9 BF 36 82 AA AA AA AA|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,40531; reference:cve,2010-1253; classtype:attempted-user; sid:18772; rev:14;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel ADO Object Parsing Code Execution"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|1C 00 03 08 00 00 07 00 01 00 03 00|"; content:"|CD 07 C1 80|"; within:4; distance:42; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,40531; reference:cve,2010-1253; classtype:attempted-user; sid:18771; rev:14;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Publisher 97 conversion remote code execution attempt"; flow:to_client,established; flowbits:isset,file.pub; file_data; content:"|00 FF FF 67 7E 66 00 48 D4 03 00 57 D7 03 00 FF FF 14 00 1A|"; fast_pattern:only; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2010-2571; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-103; classtype:attempted-user; sid:18214; rev:14;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel rtToolbarDef record integer overflow attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|A7 00|"; content:"|DF D6 D5 3B|"; within:4; distance:11; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2011-0097; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-021; classtype:attempted-user; sid:20534; rev:11;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Publisher Opltc memory corruption attempt"; flow:to_client,established; flowbits:isset,file.pub; file_data; content:"|03 00 00 00 02 20 FF FF 00 00 03 20 03 00 00 00 04 20 03 00 00 00 0A 20|"; fast_pattern:only; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2011-3410; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-091; classtype:attempted-user; sid:20719; rev:11;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel Lel record memory corruption attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|18 01 41 41 41 41 BE 00 12 00 19 01 00 00 1A 00 1B 00 1F 00 28 00 1E 00|"; fast_pattern:only; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2011-3403; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-096; classtype:attempted-user; sid:20718; rev:11;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel use after free attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|01 07 B0 00 41 20 41 20 41 20 0A 03 B0 02 42 00 10 00 00|"; fast_pattern:only; metadata:service ftp-data, service http, service imap, service pop3; reference:url,aluigi.altervista.org/adv/excel_1-adv.txt; classtype:attempted-user; sid:20885; rev:6;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel use after free attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|AB 03 00 00 AC 03 00 00 40 03 00 00 AE 03 00 00|"; fast_pattern:only; metadata:service ftp-data, service http, service imap, service pop3; reference:url,aluigi.altervista.org/adv/excel_1-adv.txt; classtype:attempted-user; sid:20887; rev:6;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel use after free attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|A8 03 00 00 A9 03 00 00 01 03 00 00 AB 03 00 00|"; fast_pattern:only; metadata:service ftp-data, service http, service imap, service pop3; reference:url,aluigi.altervista.org/adv/excel_1-adv.txt; classtype:attempted-user; sid:20886; rev:6;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel window2 record use after free attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|36 DC B6 EC D4 92 4A 43 9F 65 67 65 38 2F 2E 59 0E B4 FB A5 DF 68 F9 E8|"; fast_pattern:only; metadata:service ftp-data, service http, service imap, service pop3; reference:url,aluigi.altervista.org/adv/excel_2-adv.txt; classtype:attempted-user; sid:21083; rev:7;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel window2 record use after free attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|00 3E 02 12 00 B6 06 00 00 00 7F 40 00 00 00 00|"; fast_pattern:only; metadata:service ftp-data, service http, service imap, service pop3; reference:url,aluigi.altervista.org/adv/excel_2-adv.txt; classtype:attempted-user; sid:21082; rev:7;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel macro validation arbitrary code execution attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|09 08 10 00 00 06 05 00 57 14 CD 07 C9 C0 00 00 06 03 00 00 87 00 00 00 E1 00 02 00 B0 04 FF FF|"; content:"|00 02 00 00 00 AF 01 02 00 00 00 BC 01 02 00 00 00 3D 00 12 00 79 0E 20 0D F3 39 61 26 3C 00 00|"; distance:0; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2008-0081; reference:url,technet.microsoft.com/en-us/security/bulletin/MS08-014; classtype:attempted-user; sid:21157; rev:6;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel macro validation arbitrary code execution attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|09 08 10 00 00 06 10 00 B8 1F CD 07 C1 C0 00 00 06 03 00 00 0B 02 10|"; content:"|00 00 00 05 C1 16 00 00 00 31 00 34 00 39 00 38 00 37 00 62 00 79 00 74 00 65 00 73 00 00 00 00|"; distance:0; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2008-0081; reference:url,technet.microsoft.com/en-us/security/bulletin/MS08-014; classtype:attempted-user; sid:21156; rev:6;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel macro validation arbitrary code execution attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|09 08 10 00 00 06 05 00 C2 28 CD 07 C9 80 00 00 06 02 00 00 DF 00 02 00 B0 04 C1 00 02 00 00 00|"; content:"|13 00 02 00 00 00 AF 01 02 00 00 00 BC 01 02 00 00 00 3D 00 12 00 78 00 3C 00 4C 2C 81 24 38 00|"; distance:0; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2008-0081; reference:url,technet.microsoft.com/en-us/security/bulletin/MS08-014; classtype:attempted-user; sid:21158; rev:6;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Visio invalid row option attempt"; flow:to_client,established; flowbits:isset,file.visio; file_data; content:"|C4 01 00 00 00 00 00 00 00 03 18 00 00 00 00 00 FF FF FF 00 FF 00 00 00 00 FF 00 00 00 00 FF 00 FF FF 00 00 FF 00 FF 00 00 FF FF 00 80 00 00 00 00|"; fast_pattern:only; metadata:policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-0138; reference:url,technet.microsoft.com/en-us/security/bulletin/ms12-015; classtype:attempted-user; sid:21291; rev:6;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Visio corrupted compressed data memory corruption attempt"; flow:to_client,established; flowbits:isset,file.visio; file_data; content:"|FF 00 00 6C 0B 00 00 C9 00 FF 44 00 24 F7 1D 01 4D 19 F7 00 00 06 EB F0 3F 00 56 00 5F 54 FB 1D|"; fast_pattern:only; metadata:policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-0137; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-015; classtype:attempted-user; sid:21293; rev:7;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel MergeCells record parsing code execution attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|E5 00 32 00 06 00 04 00 04 00 00 00 04 00 00 00 04 00 05 00 00 02 00 00 00 00 02 00 04 00 02 00 02 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,43652; reference:cve,2010-3237; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-080; classtype:attempted-user; sid:21414; rev:7;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel SXDB memory corruption"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|00 00 FF FF B2 00 08 00 AA AA AA AA 03 00 FF FF|"; fast_pattern:only; metadata:service ftp-data, service http, service imap, service pop3; reference:bugtraq,36943; reference:cve,2009-3127; classtype:attempted-user; sid:21503; rev:9;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office PowerPoint malformed record call to freed object attempt"; flow:to_client,established; flowbits:isset,file.ppt; file_data; content:"|1F 00 44 F1|"; content:"|27 F1|"; within:8; content:"|0F 00 2E F1|"; within:750; content:"|0F 00 2E F1|"; within:750; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2011-0655; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-022; classtype:attempted-admin; sid:21647; rev:7;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel DbOrParamQry.fodbcConn parsing remote code execution attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|B0 F3 E0 71 2D B6 2D 9E 9F AC CF BB 47 FC F3 F8 FF 79 F1 CA EA DB 59 A7 2C 9B 7F 7C E5 CD B9 61 5B 6C BD 2E 77 3A BF FC|"; fast_pattern:only; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2010-0264; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-017; classtype:attempted-user; sid:21930; rev:4;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel TXO and OBJ records parsing stack memory corruption attempt"; flow:to_client,established; flowbits:isset,file.xls; flowbits:isnotset,cve.2008-4265; file_data; content:"|5D 00|"; depth:5000; content:"|00 00 00 00|"; within:4; distance:12; content:"|00 00 00 00 00 00 00 00|"; within:8; distance:4; content:"|B6 01|"; within:300; distance:-300; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,32618; reference:cve,2008-4265; reference:url,technet.microsoft.com/en-us/security/bulletin/MS08-074; classtype:attempted-user; sid:21932; rev:4;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel DbOrParamQry.fodbcConn parsing remote code execution attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|E2 72 E9 8C B1 C7 D2 C3 DC B8 BB B9 3A E6 EF 8C 59 DC 28 FE 65 BF 1F 53 D2 6F C2 CE 03 2E 9F EB 7C 73 9C 70 8E E3 14 AC|"; fast_pattern:only; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2010-0264; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-017; classtype:attempted-user; sid:21929; rev:4;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel TXO and OBJ records parsing stack memory corruption attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|EB 00|"; content:"|0F 00 00 F0|"; within:4; distance:2; flowbits:set,cve.2008-4265; flowbits:noalert; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,32618; reference:cve,2008-4265; reference:url,technet.microsoft.com/en-us/security/bulletin/MS08-074; classtype:misc-activity; sid:21931; rev:4;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel malformed FBI record buffer overflow attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|68 10 0A 00|"; byte_test:2,>,32767,8,relative,little; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,23826; reference:cve,2007-1203; reference:cve,2007-1747; reference:url,technet.microsoft.com/en-us/security/bulletin/ms07-023; classtype:attempted-user; sid:21928; rev:8;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel MalformedPalette Record Memory Corruption attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|80 07 FF 93 02 04 00 00 80 00 FF 93 02 04 00 14 80 05 FF 92 00 B2 00 A0 00 41 41 41 41 41 41 41|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,21922; reference:cve,2007-0031; classtype:attempted-user; sid:21933; rev:4;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Windows embedded packager object with .application extension bypass attempt"; flow:to_client,established; flowbits:isset,ms.packager; flowbits:isset,file.ole; file_data; content:".application"; content:!"."; within:1; pcre:"/\x00\w+?\.application[^\x2E]/"; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-0013; reference:url,technet.microsoft.com/en-us/security/bulletin/ms12-005; classtype:attempted-user; sid:20883; rev:13;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Windows embedded packager object identifier"; flow:to_client,established; flowbits:isset,file.ole; file_data; content:"|0F 00 09 04|"; fast_pattern:only; flowbits:set,ms.packager; flowbits:noalert; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-0013; reference:url,technet.microsoft.com/en-us/security/bulletin/ms12-005; classtype:attempted-user; sid:20882; rev:11;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Windows OLE versioned stream missing data stream"; flow:to_client,established; flowbits:isset,file.ole; file_data; content:"|00 49 FF 00 43 00 5F 00 4D 00 2E FF 00 56 00 53 00 53 00 00 01 00 FF 82 00 00 00 28 00 00 00|"; fast_pattern:only; metadata:service ftp-data, service http, service imap, service pop3; reference:bugtraq,50977; reference:cve,2011-3400; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-093; classtype:attempted-user; sid:20717; rev:10;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel sheet object type confusion exploit attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|00 00 00 00 51 10 1D 00 01 02 00 00 00 00 15 00 3B FF FF 00 00 00 00 00 00 01 00 13 00 13 00 01 00 01 00 00 02 51 10 1D 00 02 02 00 00 00 00 15|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-0258; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-017; classtype:attempted-user; sid:21942; rev:5;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel sheet object type confusion exploit attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|10 08 00 00 01 00 00 00 00 00 00 51 10 13 00 01 02 00 00 00 00 0B 00 3B 01 00 02 00 02 00 00 00 02 00 51 10 13 00 02 02 00 00 00 00 0B 00 3B 01|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-0258; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-017; classtype:attempted-user; sid:21943; rev:5;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office GDI+ incorrect index validation of malformed EMF image attempt"; flow:to_client,established; file_data; flowbits:isset,file.pptx; content:"|CB D5 85 A5 57 CA A4 2E 05 AA 0D DE 58 03 BA 68 2C 59 C4 E5 4E 73 8D 07 15 B6 8A 84 73 4A 66 02|"; fast_pattern:only; metadata:policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-0165; reference:url,technet.microsoft.com/en-us/security/bulletin/ms12-034; classtype:attempted-user; sid:22086; rev:4;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel rtMergeCells heap overflow attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|E5 00|"; content:!"|00 00|"; within:2; content:"|1D 00 0F 00|"; within:4; distance:-21; byte_test:2,<,1027,19,little,relative; byte_test:2,>,0x3fff,27,little,relative; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-0185; reference:url,technet.microsoft.com/en-us/security/bulletin/ms12-030; classtype:attempted-user; sid:22081; rev:7;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office GDI+ incorrect index validation of malformed EMF image attempt"; flow:to_client,established; file_data; flowbits:isset,file.ole; content:"|A2 22 EA 5E C1 8D 5B D7 2E 5C B8 70 E1 C2 8D 9B 22 88 20 58 9B 76 A3 C2 F8 FD DC 77 EF CC 4D 18|"; fast_pattern:only; metadata:policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-0165; reference:url,technet.microsoft.com/en-us/security/bulletin/ms12-034; classtype:attempted-user; sid:22085; rev:4;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel FNGROUPNAME record memory corruption attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|98 08 09 00 FF FF 00 00 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,38553; reference:cve,2010-0262; reference:url,technet.microsoft.com/en-us/security/bulletin/ms10-017; classtype:attempted-user; sid:23010; rev:6;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE EMF corruption attempt"; flow:to_client,established; flowbits:isset,file.emf; file_data; content:"|4D 00 00 00|"; byte_test:4,>,2147483647,92,relative,little; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,28819; reference:bugtraq,29142; reference:cve,2007-5746; reference:url,www.openoffice.org/security/cves/CVE-2007-5746.html; classtype:attempted-user; sid:23093; rev:4;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE EMF corruption attempt"; flow:to_client,established; flowbits:isset,file.emf; file_data; content:"|4C 00 00 00|"; byte_test:4,>,2147483647,84,relative,little; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,28819; reference:bugtraq,29142; reference:cve,2007-5746; reference:url,www.openoffice.org/security/cves/CVE-2007-5746.html; classtype:attempted-user; sid:23091; rev:4;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE EMF corruption attempt"; flow:to_client,established; flowbits:isset,file.emf; file_data; content:"|51 00 00 00|"; byte_test:4,>,2147483647,48,relative,little; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,28819; reference:bugtraq,29142; reference:cve,2007-5746; reference:cve,2017-3052; reference:url,helpx.adobe.com/security/products/acrobat/apsb17-11.html; reference:url,www.openoffice.org/security/cves/CVE-2007-5746.html; classtype:attempted-user; sid:23094; rev:5;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE EMF corruption attempt"; flow:to_client,established; flowbits:isset,file.emf; file_data; content:"|51 00 00 00|"; byte_test:4,>,2147483647,56,relative,little; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,28819; reference:bugtraq,29142; reference:cve,2007-5746; reference:cve,2017-3052; reference:url,helpx.adobe.com/security/products/acrobat/apsb17-11.html; reference:url,www.openoffice.org/security/cves/CVE-2007-5746.html; classtype:attempted-user; sid:23095; rev:5;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE EMF corruption attempt"; flow:to_client,established; flowbits:isset,file.emf; file_data; content:"|4C 00 00 00|"; byte_test:4,>,2147483647,92,relative,little; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,28819; reference:bugtraq,29142; reference:cve,2007-5746; reference:cve,2017-3052; reference:url,helpx.adobe.com/security/products/acrobat/apsb17-11.html; reference:url,www.openoffice.org/security/cves/CVE-2007-5746.html; classtype:attempted-user; sid:23092; rev:5;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE EMF corruption attempt"; flow:to_client,established; flowbits:isset,file.emf; file_data; content:"|4D 00 00 00|"; byte_test:4,>,2147483647,88,relative,little; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,28819; reference:bugtraq,29142; reference:cve,2007-5746; reference:url,www.openoffice.org/security/cves/CVE-2007-5746.html; classtype:attempted-user; sid:23105; rev:4;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel malformed graphic record code execution attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|51 10 0F 00 01 02 00 00|"; depth:256; offset:3300; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,15926; reference:cve,2006-0030; reference:url,technet.microsoft.com/en-us/security/bulletin/ms06-012; classtype:attempted-user; sid:23150; rev:6;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Outlook arbitrary command line attempt"; flow:to_client,established; file_data; content:"mailto|3A|"; nocase; content:"|2F|altvba"; distance:0; nocase; pcre:"/\x3c[^\x3e]+[\x22\x27]mailto\x3a[^\x3e]+\x3f[^\x3e]*\x2faltvba/smi"; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2008-0110; reference:url,technet.microsoft.com/en-us/security/bulletin/MS08-015; classtype:misc-attack; sid:23211; rev:4;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Malformed MSODrawing Record attempt"; flow:to_client,established; flowbits:isset,file.ole; file_data; content:"|02 F0|"; byte_test:4,>,0,0,relative; content:"|08 F0|"; within:2; distance:6; content:"|04 F0|"; within:2; distance:22; byte_test:4,>,0,0,relative; content:"|09 F0|"; within:2; distance:6; byte_test:4,>,0,0,relative; byte_test:4,=,0,-16,relative; content:!"|03 F0|"; within:2; distance:-18; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-0243; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-003; classtype:attempted-user; sid:23270; rev:4;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Word crafted sprm structure memory corruption attempt"; flow:to_server,established; flowbits:isset,file.doc|file.ole; file_data; content:"|16 24|"; content:"|17 24|"; within:64; content:"|06 D6|"; within:64; byte_test:2,>,0xfffc,0,relative,little; byte_test:2,<,0xffff,0,relative,little; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,32584; reference:cve,2008-4837; reference:url,technet.microsoft.com/en-us/security/bulletin/MS08-072; classtype:attempted-user; sid:23268; rev:5;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word crafted sprm structure memory corruption attempt"; flow:to_client,established; flowbits:isset,file.doc|file.ole; file_data; content:"|16 24|"; content:"|17 24|"; within:64; content:"|06 D6|"; within:64; byte_test:2,>,0xfffc,0,relative,little; byte_test:2,<,0xffff,0,relative,little; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,32584; reference:cve,2008-4837; reference:url,technet.microsoft.com/en-us/security/bulletin/MS08-072; classtype:attempted-user; sid:23266; rev:5;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Word crafted sprm structure memory corruption attempt"; flow:to_server,established; flowbits:isset,file.doc|file.ole; file_data; content:"|16 24|"; content:"|17 24|"; within:64; content:"|08 D6|"; within:64; byte_test:2,>,0xfffc,0,relative,little; byte_test:2,<,0xffff,0,relative,little; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,32584; reference:cve,2008-4837; reference:url,technet.microsoft.com/en-us/security/bulletin/MS08-072; classtype:attempted-user; sid:23267; rev:5;) # alert tcp $HOME_NET any -> $HOME_NET [139,445] (msg:"FILE-OFFICE Microsoft Office Word request for imeshare.dll over SMB attempt"; flow:to_server,established; content:"|FF|SMB|A2 00 00 00 00|"; depth:9; offset:4; content:"i|00|m|00|e|00|s|00|h|00|a|00|r|00|e|00|.|00|d|00|l|00|l|00 00 00|"; fast_pattern:only; metadata:service netbios-ssn; reference:cve,2012-1854; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-046; classtype:attempted-user; sid:23315; rev:3;) # alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"FILE-OFFICE Microsoft Office Word imeshare.dll dll-load exploit attempt"; flow:to_server,established; content:"|2F|imeshare.dll"; nocase; http_uri; metadata:service http; reference:cve,2012-1854; reference:url,attack.mitre.org/techniques/T1038; reference:url,attack.mitre.org/techniques/T1129; reference:url,attack.mitre.org/techniques/T1157; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-046; classtype:attempted-user; sid:23316; rev:3;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office WordPad and Office text converters integer underflow attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|D0 CF 11 E0|"; depth:4; content:"|FF FE|"; depth:2; offset:28; content:"|A5 DC|"; byte_test:2,<,4,140,relative; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2009-0087; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-010; classtype:attempted-user; sid:23356; rev:4;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office BMP header biClrUsed integer overflow attempt"; flow:to_server,established; flowbits:isset,file.bmp; file_data; content:"BM"; fast_pattern; content:"|00 00 00 00|"; within:4; distance:4; byte_test:4,>,536870911,36,relative,little; metadata:service smtp; reference:bugtraq,36651; reference:cve,2009-2518; classtype:attempted-admin; sid:23525; rev:3;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office PowerPoint CurrentUserAtom remote code execution attempt"; flow:to_server,established; flowbits:isset,file.ppt; file_data; content:"|00 00 F6 0F|"; content:"|14 00 00 00|"; within:4; distance:4; byte_test:2,>,255,8,relative,little; metadata:policy max-detect-ips drop, service smtp; reference:cve,2009-1131; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-017; classtype:attempted-user; sid:23536; rev:4;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel WOpt record memory corruption attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|0B 08 3F 00 2C 00 3A 00 00 5F 28 22 24 22 2A 20 23 2C 23 23 1F 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service smtp; reference:cve,2010-0824; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-038; classtype:attempted-user; sid:23554; rev:5;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office PICT graphics converter memory corruption attempt"; flow:to_server,established; flowbits:isset,file.pct; file_data; content:"|00 A1|"; content:"|49 43|"; within:2; distance:10; byte_test:2,>,4094,0,relative,big; metadata:policy max-detect-ips drop, service smtp; reference:cve,2010-3946; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-105; classtype:attempted-user; sid:23528; rev:4;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office PowerPoint Legacy file format picture object code execution attempt"; flow:to_server,established; flowbits:isset,file.ppt; file_data; content:"|FF 03 00 00 00 60 16 8F 10 00 00 00 00 5F 07 90 08 28 00 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,34834; reference:cve,2009-0223; classtype:attempted-user; sid:23539; rev:4;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel OBJ record stack buffer overflow attempt - with linkFmla"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|5D 00|"; content:"|15 00 12 00 14 00|"; within:6; distance:2; content:"|0C 00 14 00|"; within:4; distance:16; content:"|0E 00|"; within:2; distance:20; byte_jump:2,0,relative,little; content:"|13 00|"; within:2; byte_test:2,>,0,0,relative,little; byte_jump:2,2,relative,little; byte_test:2,>,1024,14,relative,little; metadata:policy max-detect-ips drop, service smtp; reference:cve,2010-0822; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-038; classtype:attempted-user; sid:23546; rev:5;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel integer field in row record improper validation remote code execution attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|08 00|P|00 00 FF 00 00 0A AA|A|8D 86 84|7|0E FF FF 00 00 00 00 00 FE 0D|"; fast_pattern:only; metadata:service smtp; reference:cve,2009-3130; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-067; classtype:attempted-user; sid:23542; rev:3;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel invalid Lbl record"; flow:to_server,established; file_data; flowbits:isset,file.xls; file_data; content:"|29 18 00 28 00 00 40 6D 0A 00 73 63 65 6E 5F 6E|"; fast_pattern:only; metadata:service smtp; reference:cve,2011-1988; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-072; classtype:attempted-user; sid:23532; rev:4;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel pivot item index boundary corruption attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|D5 00 02 00|"; byte_extract:2,0,streamID,relative,little; content:"|B0 00|"; distance:0; content:"|00 00|"; within:2; distance:18; byte_extract:2,4,iCache,relative,little; content:"|C6 00|"; byte_test:2,=,streamID,6,relative,little; byte_test:2,!=,iCache,14,relative,little; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,42199; reference:cve,2010-2562; classtype:attempted-user; sid:23558; rev:5;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel SxView record memory pointer corruption attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|B0 00 3D 00 02 00 06 00 00 00 03 00 03 00 04 00 01 00 41 41|"; fast_pattern:only; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,40523; reference:cve,2010-1245; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-038; classtype:attempted-user; sid:23551; rev:4;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel OBJ record stack buffer overflow attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|5D 00|"; content:"|15 00 12 00 14 00|"; within:6; distance:2; content:"|0C 00 14 00|"; within:4; distance:16; content:"|13 00|"; within:2; distance:20; byte_test:2,>,1024,18,relative,little; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,40520; reference:cve,2010-0822; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-038; classtype:attempted-user; sid:23544; rev:7;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office .CGM file cell array heap overflow attempt"; flow:to_server,established; file_data; content:"|41 3F 80 14 00 00 00 1F 00 1F 00 00 00 1F 00 1F 00 20 00 20 00 00 00 00 05 B8 80 80 FF FF FF 00 01|"; fast_pattern:only; metadata:policy max-detect-ips drop, service smtp; reference:cve,2010-3945; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-105; classtype:attempted-user; sid:23527; rev:5;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office PowerPoint Download of version 4.0 file"; flow:to_server,established; flowbits:isset,file.ppt; file_data; content:"R|00|o|00|o|00|t|00| |00|E|00|n|00|t|00|r|00|y|00|"; content:"P|00|P|00|4|00|0|00|"; within:8; distance:108; metadata:policy max-detect-ips drop, service smtp; reference:cve,2009-0220; reference:cve,2009-0223; reference:cve,2009-0226; reference:cve,2009-0227; reference:cve,2009-1137; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-017; classtype:attempted-user; sid:23535; rev:4;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office PowerPoint PP7 Component buffer overflow attempt"; flow:to_server,established; flowbits:isset,file.ppt; file_data; content:"|CC 0F 00 00 FF FF 00 00|"; byte_test:4,>,0x100,0,relative,little; byte_extract:4,0,length,relative,little; content:"|00 00 00 00|"; within:4; content:"|BA 0F 00 00|"; within:length; byte_test:4,>,0x100,4,relative,little; metadata:policy max-detect-ips drop, service smtp; reference:cve,2009-1129; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-017; classtype:attempted-user; sid:23538; rev:6;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel SxView record memory pointer corruption attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|B0 00 3D 00 02 00 08 00 00 00 01 00 04 00 04 00 01 00 FF 7F|"; fast_pattern:only; metadata:policy max-detect-ips drop, service smtp; reference:cve,2010-1245; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-038; classtype:attempted-user; sid:23552; rev:5;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel OBJ record stack buffer overflow attempt - with macro and linkFmla"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|5D 00|"; content:"|15 00 12 00 14 00|"; within:6; distance:2; content:"|0C 00 14 00|"; within:4; distance:16; content:"|04 00|"; within:2; distance:20; byte_jump:2,0,relative,little; content:"|0E 00|"; within:2; byte_jump:2,0,relative,little; content:"|13 00|"; within:2; byte_test:2,>,0,0,relative,little; byte_jump:2,2,relative,little; byte_test:2,>,1024,14,relative,little; metadata:policy max-detect-ips drop, service smtp; reference:cve,2010-0822; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-038; classtype:attempted-user; sid:23547; rev:5;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft HtmlDlgHelper ActiveX clsid access"; flow:to_server,established; file_data; content:"3050f4e1-98b5-11cf-bb82-00aa00bdce0b"; fast_pattern:only; metadata:policy max-detect-ips drop, service smtp; reference:cve,2010-3329; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-071; classtype:attempted-user; sid:23555; rev:7;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel invalid Lbl record"; flow:to_server,established; file_data; flowbits:isset,file.xls; file_data; content:"|0A 00 73 63 65 6E 5F 75 73 65 72 32 17 01 66 03|"; fast_pattern:only; metadata:service smtp; reference:cve,2011-1988; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-072; classtype:attempted-user; sid:23531; rev:4;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel pivot item index boundary corruption attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"PivotTable"; content:"|B0 00|"; within:200; distance:-200; content:"|00 00|"; within:2; distance:18; byte_extract:2,4,cdim,relative,little; content:"|B2 00|"; within:76; byte_test:2,>,cdim,6,relative,little; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,42199; reference:cve,2010-2562; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-057; classtype:attempted-user; sid:23559; rev:7;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Word GDI+ Office Art Property Table remote code execution attempt"; flow:to_server,established; flowbits:isset,file.doc; file_data; content:"c|00 0B F0 24 00 00 00 7F 00 04 00 04 00|X|01 00 00 00 00|V|00|AAAA"; fast_pattern:only; metadata:service smtp; reference:cve,2009-2528; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-062; classtype:attempted-user; sid:23540; rev:3;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel file SxView record exploit attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|B0 00|"; byte_test:2,>,44,0,relative,little; byte_test:2,<,8225,0,relative,little; byte_test:2,<,11,4,relative,little; byte_test:2,>,10,34,relative,little; byte_jump:2,0,relative,little; pcre:"/^[\xB1\xB4-\xB6\xC5\xF1]\x00/R"; metadata:service smtp; reference:cve,2009-3128; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-067; classtype:attempted-user; sid:23543; rev:3;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office PowerPoint paragraph format array inner header overflow attempt"; flow:to_server,established; flowbits:isset,file.ppt; file_data; content:"|1C 00 00 00 00 80 41 41 41 41 41 41 95 00 FF FF 64|"; fast_pattern:only; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,34833; reference:cve,2009-0220; classtype:attempted-user; sid:23534; rev:4;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office .CGM file cell array heap overflow attempt"; flow:to_server,established; file_data; content:"|FE 00 00 02 D6 FD FF 00 02 D5 FB FE 00 02 D4 FA FE 00 06 D6|"; fast_pattern:only; metadata:policy max-detect-ips drop, service smtp; reference:cve,2010-3945; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-105; classtype:attempted-user; sid:23526; rev:5;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel OBJ record stack buffer overflow attempt - with macro"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|5D 00|"; content:"|15 00 12 00 14 00|"; within:6; distance:2; content:"|0C 00 14 00|"; within:4; distance:16; content:"|04 00|"; within:2; distance:20; byte_jump:2,0,relative,little; content:"|13 00|"; within:2; byte_test:2,>,0,0,relative,little; byte_jump:2,2,relative,little; byte_test:2,>,1024,14,relative,little; metadata:policy max-detect-ips drop, service smtp; reference:cve,2010-0822; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-038; classtype:attempted-user; sid:23545; rev:5;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office WordPad and Office text converters integer underflow attempt"; flow:to_server,established; file_data; content:"|D0 CF 11 E0|"; depth:4; content:"|FE FF|"; depth:2; offset:28; content:"|DC A5|"; byte_test:2,<,4,138,relative,little; metadata:policy max-detect-ips drop, service smtp; reference:cve,2009-0087; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-010; classtype:attempted-user; sid:23556; rev:5;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel RTD buffer overflow attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|5A 03 00 00 00 15|excelrtd.rtdfunctions"; fast_pattern:only; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,40524; reference:cve,2010-1246; classtype:attempted-user; sid:23548; rev:5;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office TIFF filter buffer overflow attempt"; flow:to_client,established; flowbits:isset,file.tiff.little; file_data; content:"|49 49 2A 00|"; depth:4; byte_jump:4,0,relative,little,from_beginning; byte_extract:2,0,numentries,multiplier 12,little,relative; content:"|15 01 03 00|"; within:numentries; byte_test:4,<=,1,0,little,relative; byte_test:2,>,10,4,little,relative; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,45274; reference:cve,2010-3947; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-105; classtype:attempted-user; sid:23530; rev:8;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel WOpt record memory corruption attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|0B 08 3F 00 0B 08 3A 00 00 5F 28 22 24 22 2A 20 23 2C 23 23 20 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,40522; reference:cve,2010-0824; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-038; classtype:attempted-user; sid:23553; rev:4;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel GDI+ Office Art Property Table remote code execution attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"3|01 0B F0 8C 02 00 00 7F 00 08 00 08 00|E|C1 A8 01 00 00|F|C1 1C 00 00 00|Q|C1|&|00 00 00|U|C1 00 00 00 00|V|C1 00 00 00 00|W|C1 16 00 00 00|V|00|AAAA"; fast_pattern:only; metadata:service smtp; reference:cve,2009-2528; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-062; classtype:attempted-user; sid:23541; rev:3;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office WordPad and Office text converters integer underflow attempt"; flow:to_server,established; flowbits:isset,file.doc; file_data; content:"|D0 CF 11 E0|"; depth:4; content:"|FF FE|"; depth:2; offset:28; content:"|A5 DC|"; byte_test:2,<,4,140,relative; metadata:service smtp; reference:cve,2009-0087; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-010; classtype:attempted-user; sid:23557; rev:4;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office PowerPoint HashCode10Atom memory corruption attempt"; flow:to_server,established; flowbits:isset,file.ppt; file_data; content:"|0F 00 F0 03|"; content:"|00 00|+"; within:3; distance:5; isdataat:4,relative; content:!"|04 00 00 00|"; within:4; metadata:policy max-detect-ips drop, service smtp; reference:cve,2009-1130; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-017; classtype:attempted-user; sid:23537; rev:4;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel RealTimeData record stack buffer overflow attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|13 08 E9 0B 0F 00 00 F0 E1 0B 00 00 00 00 06 F0 00 00 00 00 02 04 00 00 02 00 00 00 00 00 00 00 00 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service smtp; reference:cve,2010-1246; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-038; classtype:attempted-user; sid:23550; rev:5;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel RTD buffer overflow attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|EB 06 90 90 AD 57 00 30 81 C4 24 16 00 00 C3 41|"; fast_pattern:only; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,40524; reference:cve,2010-1246; classtype:attempted-user; sid:23549; rev:5;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel invalid Lbl record"; flow:to_server,established; file_data; flowbits:isset,file.xls; file_data; content:"|40 6D 0B 00 73 63 65 6E 5F 63 68 61 6E 67 65 2C|"; fast_pattern:only; metadata:service smtp; reference:cve,2011-1988; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-072; classtype:attempted-user; sid:23533; rev:4;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Visio DXF file text overflow attempt"; flow:to_server,established; flowbits:isset,file.dxf; file_data; content:"ENTITIES"; content:"MTEXT"; distance:0; content:"|5C|L"; distance:0; isdataat:250,relative; content:!"|3B|"; within:250; content:!"|5C 5C|"; within:250; distance:-250; content:!"|5C|0"; within:250; distance:-250; metadata:policy max-detect-ips drop, policy security-ips drop, service smtp; reference:cve,2012-1888; reference:url,technet.microsoft.com/en-us/security/bulletin/ms12-059; classtype:attempted-user; sid:23843; rev:10;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Visio DXF file text overflow attempt"; flow:to_server,established; flowbits:isset,file.dxf; file_data; content:"ENTITIES"; content:"MTEXT"; distance:0; content:"|5C|O"; distance:0; isdataat:250,relative; content:!"|3B|"; within:250; content:!"|5C 5C|"; within:250; distance:-250; content:!"|5C|0"; within:250; distance:-250; metadata:policy max-detect-ips drop, policy security-ips drop, service smtp; reference:cve,2012-1888; reference:url,technet.microsoft.com/en-us/security/bulletin/ms12-059; classtype:attempted-user; sid:23956; rev:6;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office EMF image EMFPlusPointF record memory corruption attempt"; flow:to_server,established; file_data; content:"|02 04 ED 9F F3 EE 77 BA A1 09 E7 97 42 49 07 A4 39 2E FF 00 D8 05 00 00 01 00 00 00 00 00 00 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, policy security-ips drop, service smtp; reference:cve,2012-0167; classtype:attempted-user; sid:23992; rev:4;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Works 4.x converter font name buffer overflow attempt"; flow:to_client,established; flowbits:isset,file.works; file_data; content:"Times|20|New|20|Roman|20|Cyr|03 10 FF 41 41 41 41 41 41 41 41 41 41 41 41|"; content:"|41 41 41 41 28 AE 12 00 41 41 41 41 58 17 DD 77|"; within:16; distance:112; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2009-1533; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-024; classtype:attempted-user; sid:18616; rev:10;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft DirectShow Line 21 decoder exploit attempt"; flow:to_client,established; file_data; content:"|52 49 46 46 F8 C1 4E 0E 41 56 49 20 4C 49 53 54 90 7C 01 00 68 64 72 6C 61 76 69 68 38 00 00 00 56 82 00 00 5D FA 4C 01 00 02 00 00 10 08 00 00|"; fast_pattern:only; metadata:policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-0004; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-004; classtype:attempted-user; sid:20880; rev:7;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel catLabel pointer manipulation attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|20 10 08 00|"; byte_test:2,>,31999,2,relative,little; byte_test:1,!&,248,6,relative,little; content:"|00 62 10 12 00|"; within:5; distance:7; metadata:service ftp-data, service http, service imap, service pop3; reference:bugtraq,46225; reference:cve,2011-0978; reference:url,technet.microsoft.com/en-us/security/bulletin/ms11-021; classtype:attempted-user; sid:24129; rev:5;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel catLabel pointer manipulation attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|20 10 08 00|"; byte_test:2,>,31999,2,relative,little; byte_test:1,!&,248,6,relative,little; content:"|00|"; within:1; distance:7; metadata:service smtp; reference:bugtraq,46225; reference:cve,2011-0978; reference:url,technet.microsoft.com/en-us/security/bulletin/ms11-021; classtype:attempted-user; sid:24130; rev:4;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Visio DXF variable name overflow attempt"; flow:to_server,established; flowbits:isset,file.dxf; file_data; content:"HEADER"; content:"9"; distance:0; content:"|0A 24|"; distance:0; isdataat:92,relative; content:!"|0A|"; within:92; pcre:"/HEADER[\x20\r]*\n[\x20]*9[\x20\r]*\n\x24[^\n]{92}/"; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,39836; reference:cve,2010-1681; classtype:attempted-user; sid:24186; rev:3;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel drawing layer use after free attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|0F 00 03 F0|"; fast_pattern; content:"|0F 00 04 F0|"; within:4; distance:4; byte_extract:4,0,container_size,relative,little; content:"|01 00 09 F0 10 00 00 00|"; within:8; content:!"|0A F0 08 00 00 00|"; within:6; distance:18; content:"|00 00 11 F0 00 00 00 00|"; within:container_size; distance:-8; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,46227; reference:cve,2011-0977; reference:url,technet.microsoft.com/en-us/security/bulletin/ms11-023; classtype:attempted-user; sid:24241; rev:7;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel drawing layer use after free attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|0F 00 04 F0|"; fast_pattern; content:!"|0F 00 03 F0|"; within:4; distance:-12; byte_extract:4,0,container_size,relative,little; content:!"|0A F0 08 00 00 00|"; within:6; distance:2; content:"|0B F0|"; within:2; distance:18; content:"|00 00 11 F0 00 00 00 00|"; within:container_size; distance:-20; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,46227; reference:cve,2011-0977; reference:url,technet.microsoft.com/en-us/security/bulletin/ms11-023; classtype:attempted-user; sid:24240; rev:7;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel drawing layer use after free attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|0F 00 03 F0|"; fast_pattern; content:"|0F 00 04 F0|"; within:4; distance:4; byte_extract:4,0,container_size,relative,little; content:"|01 00 09 F0 10 00 00 00|"; within:8; content:!"|0A F0 08 00 00 00|"; within:6; distance:18; content:"|00 00 11 F0 00 00 00 00|"; within:container_size; distance:-8; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,46227; reference:cve,2011-0977; reference:url,technet.microsoft.com/en-us/security/bulletin/ms11-023; classtype:attempted-user; sid:24242; rev:7;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office rtf document generic exploit indicator"; flow:to_client,established; flowbits:isset,file.rtf; file_data; content:"%USERPROFILE%|5C|"; pcre:"/\x25USERPROFILE\x25\x5C[^\x2e]{1,255}\x2eexe/"; metadata:service ftp-data, service http, service imap, service pop3; classtype:attempted-user; sid:21907; rev:6;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office RTF malformed second pfragments field"; flow:to_server,established; flowbits:isset,file.rtf; file_data; content:"pFragments"; nocase; content:"{|5C|sv"; within:15; nocase; pcre:"/^[^\x3B\x7D]{0,10}\x3B[^\x3B\x7D]{64}/smiR"; metadata:policy max-detect-ips drop, policy security-ips drop, service smtp; reference:bugtraq,44652; reference:cve,2010-3333; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-087; classtype:attempted-user; sid:18704; rev:13;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE RTF file with embedded OLE object"; flow:to_client,established; flowbits:isset,file.rtf; file_data; content:"|5C|objdata"; content:"d0cf11e0a1b11ae1"; fast_pattern:only; metadata:service ftp-data, service http, service imap, service pop3; reference:url,www.adobe.com/devnet/acrobat/javascript.html; classtype:policy-violation; sid:18685; rev:13;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Windows RTF file with embedded object package download attempt"; flow:to_client,established; file_data; content:"{|5C|rt"; nocase; content:"{|5C|object|5C|objemb{|5C|*|5C|objclass Package}"; distance:0; nocase; flowbits:set,file.rtf.embed; metadata:policy max-detect-ips alert, ruleset community, service ftp-data, service http, service imap, service pop3; reference:cve,2006-4692; reference:url,technet.microsoft.com/en-us/security/bulletin/ms06-065; classtype:misc-activity; sid:8445; rev:16;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office RTF malformed pfragments field"; flow:to_server,established; flowbits:isset,file.rtf; file_data; content:"|5C|shp"; nocase; content:"|5C|sp"; within:50; nocase; pcre:"/\x7b[^\x7d]*?\x5csv[^\x7d]*?(\d+)?\x3b(\d+)?\x3b[^\x7d\x3b]{12}/Ri"; byte_test:4,>,4,-4,relative,little; metadata:policy max-detect-ips drop, policy security-ips drop, service smtp; reference:bugtraq,44652; reference:cve,2010-3333; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-087; classtype:attempted-user; sid:22102; rev:8;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office RTF malformed second pfragments field"; flow:to_server,established; flowbits:isset,file.rtf; content:"pFragments"; nocase; content:"{|5C|sv"; within:15; nocase; pcre:"/^[^\x3B\x7D]{0,10}\x3B[^\x3B\x7D]{64}/smiR"; metadata:policy max-detect-ips drop, policy security-ips drop, service smtp; reference:bugtraq,44652; reference:cve,2010-3333; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-087; classtype:attempted-user; sid:18705; rev:11;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Windows object packager dialogue code execution attempt"; flow:to_client,established; flowbits:isset,file.rtf; file_data; content:"73797374656d3332"; fast_pattern; nocase; content:"78707370327265732e646c6c"; within:30; nocase; content:"636d642e657865"; distance:0; nocase; metadata:service ftp-data, service http, service imap, service pop3; reference:bugtraq,20318; reference:cve,2006-4692; classtype:attempted-admin; sid:21524; rev:6;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office RTF malformed pfragments field"; flow:to_server,established; flowbits:isset,file.rtf; file_data; content:"pFragments"; nocase; content:"{|5C|sv"; within:15; nocase; pcre:"/[^\x3b\x7d]*\x3b[^\x3b\x7d]*\x3b.{8}/smiR"; byte_test:4,>,4,0,relative,string,hex; metadata:policy max-detect-ips drop, policy security-ips drop, service smtp; reference:bugtraq,44652; reference:cve,2010-3333; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-087; classtype:attempted-user; sid:18702; rev:14;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office RTF malformed pfragments field"; flow:to_client,established,only_stream; flowbits:isset,file.rtf; file_data; content:"|5C|shp"; nocase; content:"|5C|sp"; within:50; nocase; pcre:"/\x7b[^\x7d]*?\x5csv[^\x7d]*?(\d+)?\x3b(\d+)?\x3b[^\x7d\x3b]{12}/Ri"; byte_test:4,>,4,-4,relative,little; metadata:policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,44652; reference:cve,2010-3333; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-087; classtype:attempted-user; sid:22101; rev:7;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office RTF malformed second pfragments field"; flow:to_client,established; flowbits:isset,file.rtf; file_data; content:"pFragments"; nocase; content:"{|5C|sv"; within:15; nocase; pcre:"/^[^\x3B\x7D]{0,10}\x3B[^\x3B\x7D]{64}/smiR"; metadata:policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,44652; reference:cve,2010-3333; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-087; classtype:attempted-user; sid:18706; rev:15;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office RTF malformed pfragments field"; flow:to_server,established; flowbits:isset,file.rtf; content:"pFragments"; nocase; content:"{|5C|sv"; within:15; nocase; pcre:"/[^\x3b\x7d]*\x3b[^\x3b\x7d]*\x3b.{8}/smiR"; byte_test:4,>,4,0,relative,string,hex; metadata:policy max-detect-ips drop, policy security-ips drop, service smtp; reference:bugtraq,44652; reference:cve,2010-3333; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-087; classtype:attempted-user; sid:18703; rev:12;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office TIFF filter buffer overflow attempt"; flow:to_client,established; flowbits:isset,file.tiff.big; file_data; content:"|4D 4D 00 2A|"; depth:4; byte_jump:4,0,relative,big,from_beginning; byte_extract:2,0,numentries,multiplier 12,big,relative; content:"|01 15 00 03|"; within:numentries; byte_test:4,<=,1,0,big,relative; byte_test:2,>,10,4,big,relative; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,45274; reference:cve,2010-3947; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-105; classtype:attempted-user; sid:24556; rev:6;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office TIFF filter buffer overflow attempt"; flow:to_server,established; flowbits:isset,file.tiff.little; file_data; content:"|49 49 2A 00|"; depth:4; byte_jump:4,0,relative,little,from_beginning; byte_extract:2,0,numentries,multiplier 12,little,relative; content:"|15 01 03 00|"; within:numentries; byte_test:4,<=,1,0,little,relative; byte_test:2,>,10,4,little,relative; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,45274; reference:cve,2010-3947; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-105; classtype:attempted-user; sid:24557; rev:5;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office TIFF filter buffer overflow attempt"; flow:to_server,established; flowbits:isset,file.tiff.big; file_data; content:"|4D 4D 00 2A|"; depth:4; byte_jump:4,0,relative,big,from_beginning; byte_extract:2,0,numentries,multiplier 12,big,relative; content:"|01 15 00 03|"; within:numentries; byte_test:4,<=,1,0,big,relative; byte_test:2,>,10,4,big,relative; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,45274; reference:cve,2010-3947; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-105; classtype:attempted-user; sid:24558; rev:5;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel Publisher record heap buffer overflow attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|88 00 08 00|"; content:"|01 00|"; within:2; distance:4; content:"|89 00|"; within:2; distance:2; byte_test:2,<,46,0,relative,little; metadata:policy max-detect-ips drop, policy security-ips drop, service smtp; reference:cve,2010-1250; reference:cve,2012-1886; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-038; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-076; classtype:attempted-user; sid:24657; rev:7;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel SST record invalid length memory corruption attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|8C 00|"; byte_jump:2,0,relative,little; content:"|C1 01|"; within:2; byte_jump:2,0,relative,little; content:"|FC 00|"; within:2; byte_test:2,<,8,0,relative,little; byte_test:4,>,0,2,relative,little; metadata:policy security-ips drop, service smtp; reference:bugtraq,56430; reference:cve,2012-1887; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-076; classtype:attempted-user; sid:24674; rev:5;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel SERIES record code execution attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|5B 10 0E 00|"; content:"|04|"; within:1; distance:1; byte_test:2,&,0x8000,10,relative,little; metadata:policy security-ips drop, service smtp; reference:cve,2012-1885; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-076; classtype:attempted-user; sid:24659; rev:7;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel SST record invalid length memory corruption attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|8C 00|"; byte_jump:2,0,relative,little; content:"|C1 01|"; within:2; byte_jump:2,0,relative,little; content:"|FC 00|"; within:2; byte_test:2,<,8,0,relative,little; byte_test:4,>,0,2,relative,little; metadata:policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,56430; reference:cve,2012-1887; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-076; classtype:attempted-user; sid:24673; rev:5;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel SERIES record code execution attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|5B 10 0E 00|"; content:"|04|"; within:1; distance:1; byte_test:2,&,0x8000,10,relative,little; metadata:policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-1885; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-076; classtype:attempted-user; sid:24658; rev:7;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office .CGM file cell array heap overflow attempt"; flow:to_server,established; flowbits:isset,file.cgm; file_data; content:"|20 42 00 01 00 80 41 3F 8F F8 00 00 00 95 00 C7 00 00 00 C7 00 95 00 AA 00 96 00 08 00 00 00 0C|"; fast_pattern:only; metadata:policy max-detect-ips drop, policy security-ips drop, service smtp; reference:cve,2010-3945; reference:cve,2012-2524; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-105; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-057; classtype:attempted-user; sid:24823; rev:4;) # alert tcp any any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Visio VSD file icon memory corruption attempt"; flow:to_server,established; file_data; flowbits:isset,file.visio; content:"|A8 00 04 00 01 00 70 00 00 00 20 FF 20 00 00 00 DD 00 00 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service smtp; reference:cve,2009-0095; reference:url,technet.microsoft.com/en-us/security/bulletin/ms09-005; classtype:attempted-user; sid:24815; rev:4;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office PowerPoint bad text header txttype attempt"; flow:to_server,established; flowbits:isset,file.ppt; file_data; content:"|00 00 00 00 9F 0F 04 00 00 00|"; byte_test:1,>,8,0,relative,little; metadata:service smtp; reference:cve,2006-0022; reference:cve,2011-1269; reference:url,technet.microsoft.com/en-us/security/bulletin/MS06-028; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-036; classtype:attempted-user; sid:24868; rev:4;) alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel IPMT record buffer overflow attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|1C 1D 13 08 48 00 13 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 25 02 00 00 00 11 6D 79 63 6F|"; fast_pattern:only; metadata:policy balanced-ips drop, policy security-ips drop, service smtp; reference:cve,2011-0101; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-021; classtype:attempted-user; sid:25295; rev:2;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel IPMT record buffer overflow attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|06 04 00 00 A7 00 04 00 B0 0F 0C 00 3C 00 50 01 77 8D A4 06 30 00 00 00 00 00 00 00 00 00 00 00|"; fast_pattern:only; metadata:policy balanced-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2011-0101; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-021; classtype:attempted-user; sid:25294; rev:2;) alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel IPMT record buffer overflow attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|06 04 00 00 A7 00 04 00 B0 0F 0C 00 3C 00 50 01 77 8D A4 06 30 00 00 00 00 00 00 00 00 00 00 00|"; fast_pattern:only; metadata:policy balanced-ips drop, policy security-ips drop, service smtp; reference:cve,2011-0101; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-021; classtype:attempted-user; sid:25296; rev:2;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office PowerPoint integer underflow heap corruption attempt"; flow:to_server,established; flowbits:isset,file.ppt; file_data; content:"|42 F1 00 00 00 00 03|"; fast_pattern:only; metadata:policy max-detect-ips drop, service smtp; reference:cve,2010-2573; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-088; classtype:attempted-user; sid:25311; rev:5;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office RTF malformed pfragments field"; flow:to_client,established; flowbits:isset,file.rtf; file_data; content:"pfragments|00 CC 7D 7B 7B 5C 2A 5C 2A 7D 5C 73 76 7B 7D 7B 5C 69 6E|"; fast_pattern:only; metadata:policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,44652; reference:cve,2010-3333; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-087; classtype:attempted-user; sid:25393; rev:4;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office PowerPoint TextCharsAtom record buffer overflow attempt"; flow:to_server,established; flowbits:isset,file.ppt; file_data; content:"|00 00 A0 0F|"; byte_test:1,>,127,3,relative,little; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,38108; reference:cve,2010-0034; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-004; classtype:attempted-user; sid:25527; rev:5;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office PowerPoint malformed shapeid arbitrary code execution attempt"; flow:to_server,established; flowbits:isset,file.ppt; file_data; content:"|D0 CF 11 E0 A1 B1 1A E1|"; depth:8; content:"|0A F0 08 00 00 00|"; byte_test:2,&,1024,4,relative,little; byte_test:2,&,8,4,relative,little; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,28146; reference:cve,2008-0118; reference:url,technet.microsoft.com/en-us/security/bulletin/ms08-016; classtype:attempted-user; sid:25587; rev:6;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Word Document remote code execution attempt"; flow:to_server,established; flowbits:isset,file.doc; file_data; content:"|EC A5|"; byte_test:2,<,38,0,relative,little; byte_test:4,>,0,22,relative,little; byte_test:4,<,250,22,relative,little; metadata:service smtp; reference:cve,2009-3135; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-068; classtype:attempted-user; sid:25630; rev:2;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Word Document remote code execution attempt"; flow:to_server,established; flowbits:isset,file.doc; file_data; content:"|DC A5|"; byte_test:2,<,38,0,relative,little; byte_test:4,>,0,22,relative,little; byte_test:4,<,250,22,relative,little; metadata:service smtp; reference:cve,2009-3135; reference:cve,2016-3283; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-068; reference:url,technet.microsoft.com/en-us/security/bulletin/MS16-088; classtype:attempted-user; sid:25631; rev:3;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Word unchecked index value remote code execution attempt"; flow:to_server,established; flowbits:isset,file.doc; file_data; content:"|E0 10 11 84 00 00 15 C6 05 00 01 48 12 06 5E 84 E0 10 60 84 00 00 6F 28 00 87 68 00 00 00 00 88|"; fast_pattern:only; content:"|0F 84 1C 11 11 84 4C FF 15 C6 05 00 01 1C 11 06|"; metadata:service smtp; reference:cve,2010-3219; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-079; classtype:attempted-user; sid:25768; rev:3;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel MsoDrawingGroup record remote code execution attempt"; flow:to_server,established; flowbits:isset,file.xls&file.ole; file_data; content:"|09 08|"; content:"|0A 00|"; distance:6; content:"|EB 00|"; byte_test:2,>,0,0,relative,little; byte_jump:2,0,relative,little; isdataat:2,relative; content:!"|EC 00|"; within:2; distance:2; content:"|5D 00 1A 00 15 00 12 00|"; within:8; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,35243; reference:cve,2009-0559; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-021; classtype:attempted-user; sid:25969; rev:7;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Visio version number anomaly"; flow:to_server,established; flowbits:isset,file.visio&file.ole; file_data; content:"Visio |28|TM|29| Drawing|0D 0A 00 00 00 00|"; fast_pattern:only; pcre:"/Visio \x28TM\x29 Drawing\r\n\x00{4}([^\x00]|\x00[^\x00]|\x00\x00[^\x0b]|\x00\x00\x0b[^\x00])/smi"; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,24349; reference:cve,2007-0934; reference:url,technet.microsoft.com/en-us/security/bulletin/MS07-030; classtype:misc-activity; sid:26089; rev:5;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office OneNote 2010 buffer overread info disclosure attempt"; flow:to_server,established; file_data; content:"|E4 52 5C 7B 8C D8 A7 4D AE B1 53 78 D0 29 96 D3|"; depth:16; content:"|09 34 00 20 5B 34 00 1C|"; byte_test:2,>,499,0,relative; metadata:service smtp; reference:cve,2013-0086; reference:url,technet.microsoft.com/en-us/security/bulletin/MS13-025; classtype:attempted-recon; sid:26171; rev:2;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Visio TAG_xxxSheet code execution attempt"; flow:to_client,established; flowbits:isset,file.visio; file_data; content:"|6D 00 FF FF 00 00 03 00 20 00 00 00 03 00 FF FF FF FF FF FF FF FF 00 00 00 00 00 00 02 00 FF FF|"; fast_pattern:only; metadata:policy balanced-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2013-0079; reference:url,technet.microsoft.com/en-us/security/bulletin/MS13-023; classtype:attempted-user; sid:26163; rev:5;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office OneNote 2010 buffer overread info disclosure attempt"; flow:to_client,established; file_data; content:"|E4 52 5C 7B 8C D8 A7 4D AE B1 53 78 D0 29 96 D3|"; depth:16; content:"|09 34 00 20 5B 34 00 1C|"; byte_test:2,>,499,0,relative; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2013-0086; reference:url,technet.microsoft.com/en-us/security/bulletin/MS13-025; classtype:attempted-recon; sid:26170; rev:3;) alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Visio TAG_xxxSheet code execution attempt"; flow:to_server,established; flowbits:isset,file.visio; file_data; content:"|6D 00 FF FF 00 00 03 00 20 00 00 00 03 00 FF FF FF FF FF FF FF FF 00 00 00 00 00 00 02 00 FF FF|"; fast_pattern:only; metadata:policy balanced-ips drop, policy security-ips drop, service smtp; reference:cve,2013-0079; reference:url,technet.microsoft.com/en-us/security/bulletin/MS13-023; classtype:attempted-user; sid:26164; rev:5;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel invalid FRTWrapper record buffer overflow attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"Sheet"; content:"|51 08|"; distance:0; byte_test:2,<,8,0,relative,little; content:"|51 08|"; within:2; distance:2; metadata:policy max-detect-ips drop, service smtp; reference:cve,2008-3471; reference:url,technet.microsoft.com/en-us/security/bulletin/MS08-057; classtype:attempted-user; sid:26175; rev:4;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel FRTWrapper record buffer overflow attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|51 08 00 00|AAAAAAAAAAAAAAAA"; fast_pattern:only; metadata:policy max-detect-ips drop, service smtp; reference:cve,2008-3471; reference:url,technet.microsoft.com/en-us/security/bulletin/MS08-057; classtype:attempted-user; sid:26174; rev:4;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel SXDB memory corruption attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|06 04 00 00 67 08 61 01 67 08 00 00 00 00 00 00|"; fast_pattern:only; metadata:service smtp; reference:bugtraq,36943; reference:cve,2009-3127; classtype:attempted-user; sid:26177; rev:3;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel SXDB memory corruption attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|06 04 00 00 67 08 61 01 67 08 00 00 00 00 00 00|"; fast_pattern:only; metadata:service ftp-data, service http, service imap, service pop3; reference:bugtraq,36943; reference:cve,2009-3127; classtype:attempted-user; sid:26176; rev:5;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office PowerPoint TxMasterStyle10Atom atom numLevels buffer overflow attempt"; flow:to_server,established; flowbits:isset,file.ppt; file_data; content:"|0F 00 F8 03|"; byte_extract:4,4,master_record,relative,little; content:"|B2 0F|"; within:master_record; byte_test:2,>,5,4,relative,little; byte_test:1,<,0x90,-4,relative; byte_test:1,!&,0x01,-4,relative; byte_test:1,!&,0x02,-4,relative; byte_test:1,!&,0x04,-4,relative; byte_test:1,!&,0x08,-4,relative; metadata:policy max-detect-ips drop, service smtp; reference:cve,2008-1455; reference:url,technet.microsoft.com/en-us/security/bulletin/ms08-051; classtype:attempted-user; sid:26330; rev:3;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel format record code execution attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|D0 CF 11 E0 A1 B1 1A E1|"; depth:8; content:"|09 08 10 00 00 06|"; distance:0; content:"|1E 04|"; distance:0; fast_pattern; byte_test:2,>,392,2,relative,little; byte_test:2,>,4,0,relative,little; byte_test:2,<,256,4,relative,little; content:"Sheet1"; distance:0; nocase; metadata:policy max-detect-ips drop, service smtp; reference:cve,2008-3005; reference:url,technet.microsoft.com/en-us/security/bulletin/MS08-043; classtype:attempted-user; sid:26329; rev:3;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS any (msg:"FILE-OFFICE OpenOffice OLE File Stream Buffer Overflow attempt"; flow:to_server,established; flowbits:isset,file.ole; file_data; content:"W|00|o|00|r|00|d|00|D|00|o|00|c|00|u|00|m|00|e|00|n|00|t|00|"; nocase; byte_test:4,>,0x80000000,96,relative,little; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,28819; reference:cve,2008-0320; classtype:attempted-user; sid:26453; rev:3;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel file with embedded PDF object"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"startxref"; nocase; content:"%%EOF"; distance:0; nocase; isdataat:!3,relative; metadata:policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:url,www.adobe.com/devnet/acrobat/javascript.html; classtype:policy-violation; sid:18683; rev:16;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel sheet name memory corruption attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|01 16 01 00 00 F0 00 00 00 2C 03 00 00 D4 00 00 00 00 02 00 00 FF FF FF FF 34 03 00 00 D8 03 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,24691; reference:cve,2007-3490; classtype:attempted-user; sid:26602; rev:5;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office eps filters memory corruption attempt"; flow:to_server,established; flowbits:isset,file.eps; file_data; content:"%!PS-Adobe-EPSF-3.0"; fast_pattern:only; content:"|C5 D0 D3 C6|"; depth:4; byte_test:2,>,32767,24,relative,little; metadata:service smtp; reference:bugtraq,30595; reference:cve,2008-3019; reference:url,technet.microsoft.com/en-us/security/bulletin/MS08-044; classtype:attempted-user; sid:26597; rev:4;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Visio SVG external entity local file disclosure attempt"; flow:to_server,established; flowbits:isset,file.svg; file_data; content:"[^\s]+?)\s+?SYSTEM\s+?[\x22\x27]\s*?http:\x2f\x2f[^\x5d]+?\x25(?P=remote)\x3b/i"; metadata:service smtp; reference:cve,2013-1301; reference:url,technet.microsoft.com/en-us/security/bulletin/ms13-044; classtype:attempted-recon; sid:26628; rev:3;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Visio SVG external entity local file disclosure attempt"; flow:to_client,established; flowbits:isset,file.svg; file_data; content:"[^\s]+?)\s+?SYSTEM\s+?[\x22\x27]\s*?http:\x2f\x2f[^\x5d]+?\x25(?P=remote)\x3b/i"; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2013-1301; reference:url,technet.microsoft.com/en-us/security/bulletin/ms13-044; classtype:attempted-recon; sid:26627; rev:3;) # alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"FILE-OFFICE XML parameter entity reference local file disclosure attempt"; flow:to_client,established; flowbits:isset,file.xml; file_data; content:"[^\s]+?)\s+?SYSTEM\s+?[\x22\x27]\s*?file:\x2f\x2f\x2f.*?[\x22\x27]\s*?<\x21ENTITY\s+?(\x25|%\x3b)[^>]+?SYSTEM\s+?[\x22\x27]\s*?https?:\x2f\x2f[^>]+?\x25(?P=local)\x3b/si"; metadata:service http; reference:bugtraq,59765; reference:cve,2013-1301; reference:cve,2013-3137; reference:cve,2018-0878; reference:url,portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2018-0878; reference:url,technet.microsoft.com/en-us/security/bulletin/ms13-044; reference:url,technet.microsoft.com/en-us/security/bulletin/ms13-078; classtype:attempted-recon; sid:26626; rev:5;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office PowerPoint Viewer memory allocation code execution attempt"; flow:to_server,established; flowbits:isset,file.ppt; file_data; content:"|43 00 0B F0 2E 00 00 00 7F 00 80 00 80 00 04 41 64 00 00 00 05 C1 16 00 00 00 06 01 01 00 00 00 31|"; fast_pattern:only; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,30552; reference:cve,2008-0120; classtype:attempted-user; sid:26710; rev:3;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office PowerPoint Viewer memory allocation code execution attempt"; flow:to_server,established; flowbits:isset,file.ppt; file_data; content:"|43 00 0B F0 2E 00 00 00 7F 00 80 00 80 00 04 41 0A 00 00 00 05 C1 16 00 00 00 06 01 01 00 00 00 31|"; fast_pattern:only; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,30552; reference:cve,2008-0120; classtype:attempted-user; sid:26709; rev:3;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office PowerPoint Viewer memory allocation code execution attempt"; flow:to_client,established; flowbits:isset,file.ppt; file_data; content:"|43 00 0B F0 2E 00 00 00 7F 00 80 00 80 00 04 41 0A 00 00 00 05 C1 16 00 00 00 06 01 01 00 00 00 31|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,30552; reference:cve,2008-0120; classtype:attempted-user; sid:26708; rev:4;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office PowerPoint Viewer memory allocation code execution attempt"; flow:to_client,established; flowbits:isset,file.ppt; file_data; content:"|43 00 0B F0 2E 00 00 00 7F 00 80 00 80 00 04 41 64 00 00 00 05 C1 16 00 00 00 06 01 01 00 00 00 31|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,30552; reference:cve,2008-0120; classtype:attempted-user; sid:26707; rev:4;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office PowerPoint Viewer memory allocation code execution attempt"; flow:to_server,established; flowbits:isset,file.ppt; file_data; content:"|43 00 0B F0 26 00 00 00 7F 00 80 00 80 00 04 41 64 00 00 00 05 C1 0E 00 00 00 06 01 01 00 00 00 53|"; fast_pattern:only; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,30552; reference:cve,2008-0120; classtype:attempted-user; sid:26706; rev:3;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Windows WordPad sprmTSetBrc SPRM overflow attempt"; flow:to_server,established; flowbits:isset,file.doc|file.xls; file_data; content:"|08 D6|"; byte_extract:1,2,NumberOfColumns,relative,little; content:"|20 D6 0B|"; distance:0; byte_extract:1,0,itcFirst,relative,little; byte_test:1,>,itcFirst,0,relative,little; byte_test:1,>,NumberOfColumns,0,relative,little; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,43122; reference:cve,2009-3302; reference:cve,2010-2563; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-067; classtype:attempted-user; sid:26676; rev:5;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Word TextBox sub-document memory corruption attempt"; flow:to_server,established; flowbits:isset,file.doc&file.ole; file_data; content:"|42 75 66 66 65 72 20 6F 76 65 72 66 6C 6F 77|"; content:"|09 04 16 00 35 0E 00 00 CE 90 01 00 CE 90 01 00 10 00 00 00|"; fast_pattern:only; content:"|00 00 00 00 00 00 00 00 FF FF 0F 00|"; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,23380; reference:cve,2007-1910; classtype:attempted-user; sid:26674; rev:4;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Word TextBox sub-document memory corruption attempt"; flow:to_server,established; flowbits:isset,file.doc&file.ole; file_data; content:"|FF FF FF FF FF FF EC A5 C1 00 4D 20 09 04 00 00 F0 12 BF 00|"; fast_pattern:only; content:"|09 04 16 00 22 0C 00 00 80 57 00 00 80 57 00 00 02|"; content:"|00 00 00 00 00 00 00 00 FF FF 0F 00|"; within:12; distance:23; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,23380; reference:cve,2007-1910; classtype:attempted-user; sid:26673; rev:4;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word TextBox sub-document memory corruption attempt"; flow:to_client,established; flowbits:isset,file.doc&file.ole; file_data; content:"|42 75 66 66 65 72 20 6F 76 65 72 66 6C 6F 77|"; content:"|09 04 16 00 35 0E 00 00 CE 90 01 00 CE 90 01 00 10 00 00 00|"; fast_pattern:only; content:"|00 00 00 00 00 00 00 00 FF FF 0F 00|"; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,23380; reference:cve,2007-1910; classtype:attempted-user; sid:26672; rev:5;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office PowerPoint malformed shapeid arbitrary code execution attempt"; flow:to_server,established; file_data; content:"|0A F0 08 00 00 00 01 20 01 00 56 61 9A 92 B3 65 82 F0 30 00 00 00 81 01 00 00 B4 B0|"; fast_pattern:only; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,28146; reference:cve,2008-0118; reference:url,technet.microsoft.com/en-us/security/bulletin/ms08-016; classtype:attempted-user; sid:26663; rev:3;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel malformed ftCMO record remote code execution attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|09 08 10 00 00 06 10 00|"; content:"|15 00 12 00 08 00|"; distance:0; fast_pattern; content:"|5D 00|"; within:2; distance:-10; byte_test:2,>,0,0,little,relative; content:!"|EC 00|"; within:2049; distance:-2049; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2009-0100; reference:url,technet.microsoft.com/en-us/security/bulletin/ms09-009; classtype:attempted-user; sid:26711; rev:5;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel style handling overflow attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|FF 93 02|"; byte_test:2,>,40,0,relative,little; byte_test:2,>,733,4,relative,little; byte_test:1,!&,0x80,3,relative,little; content:"|80|"; within:1; distance:6; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,18872; reference:cve,2006-3431; reference:url,technet.microsoft.com/en-us/security/bulletin/ms06-059; classtype:attempted-user; sid:26801; rev:4;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel style handling overflow attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|FF 93 02|"; byte_test:2,>,40,0,relative,little; byte_test:2,>,733,4,relative,little; byte_test:1,!&,0x80,3,relative,little; content:"|00|"; within:1; distance:6; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,18872; reference:cve,2006-3431; reference:url,technet.microsoft.com/en-us/security/bulletin/ms06-059; classtype:attempted-user; sid:26800; rev:4;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel style handling overflow attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|FF 93 02|"; byte_test:2,>,40,0,relative,little; byte_test:2,>,733,4,relative,little; byte_test:1,!&,0x80,3,relative,little; content:"|80|"; within:1; distance:6; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,18872; reference:cve,2006-3431; reference:url,technet.microsoft.com/en-us/security/bulletin/ms06-059; classtype:attempted-user; sid:26799; rev:5;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office MSComctlLib.Toolbar ActiveX control exploit attempt"; flow:to_server,established; flowbits:isset,file.rtf|file.ole; flowbits:isset,mscomctl.toolbar; file_data; content:"CKBJCKBJCKBJCKBJCKBJCKBJCKBJCKBJ"; metadata:service smtp; reference:url,blog.malwaretracker.com/2013/06/tomato-garden-campaign-possible.html; classtype:attempted-user; sid:26833; rev:2;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office MSComctlLib.Toolbar ActiveX control exploit attempt"; flow:to_client,established; flowbits:isset,file.rtf|file.ole; flowbits:isset,mscomctl.toolbar; file_data; content:"CKBJCKBJCKBJCKBJCKBJCKBJCKBJCKBJ"; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-1856; reference:url,blog.malwaretracker.com/2013/06/tomato-garden-campaign-possible.html; classtype:attempted-user; sid:26832; rev:5;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office MSComctlLib.Toolbar ActiveX control access"; flow:to_server,established; file_data; content:"MSComctlLib.Toolbar.2"; fast_pattern:only; flowbits:set,mscomctl.toolbar; flowbits:noalert; metadata:policy max-detect-ips alert, service smtp; classtype:misc-activity; sid:26831; rev:4;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office MSComctlLib.Toolbar ActiveX control access"; flow:to_client,established; file_data; content:"MSComctlLib.Toolbar.2"; fast_pattern:only; flowbits:set,mscomctl.toolbar; flowbits:noalert; metadata:policy max-detect-ips alert, service ftp-data, service http, service imap, service pop3; classtype:misc-activity; sid:26830; rev:5;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office eps filters memory corruption attempt"; flow:to_server,established; flowbits:isset,file.eps; file_data; content:"%!PS-Adobe-EPSF-3.0"; fast_pattern:only; content:"|C5 D0 D3 C6|"; depth:4; byte_test:4,>,65535,24,relative,little; metadata:service smtp; reference:bugtraq,30595; reference:cve,2008-3019; reference:url,technet.microsoft.com/en-us/security/bulletin/MS08-044; classtype:attempted-user; sid:27090; rev:3;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office eps filters memory corruption attempt"; flow:to_client,established; flowbits:isset,file.eps; file_data; content:"%!PS-Adobe-3.1 EPSF-3.0"; fast_pattern:only; content:"|C5 D0 D3 C6|"; depth:4; byte_test:4,>,65535,24,relative,little; metadata:service ftp-data, service http, service imap, service pop3; reference:bugtraq,30595; reference:cve,2008-3019; reference:url,technet.microsoft.com/en-us/security/bulletin/MS08-044; classtype:attempted-user; sid:27089; rev:4;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office PowerPoint printer record buffer overflow"; flow:to_client,established; flowbits:isset,file.ppt; file_data; content:"|4E 6F 6E 65 00 44 72 69 76 65 72 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2009-0227; classtype:attempted-user; sid:27216; rev:4;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office PowerPoint schemes record buffer overflow"; flow:to_client,established; flowbits:isset,file.ppt; file_data; content:"|B2 B2 B2 B2 B2 B2 01 80 2C 01 5F 16 05 00 FF 7F 00 00 FF 00 00 00 00 00 41 41 41 41 41 41 41 41|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2009-0226; classtype:attempted-user; sid:27215; rev:4;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel style handling overflow attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|C0 20 93 02|"; byte_test:2,>,40,0,relative,little; byte_test:2,>,733,4,relative,little; byte_test:1,!&,0x80,3,relative,little; content:"|00|"; within:1; distance:6; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,18872; reference:cve,2006-3431; reference:url,technet.microsoft.com/en-us/security/bulletin/ms06-059; classtype:attempted-user; sid:27214; rev:3;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel style handling overflow attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|C0 20 93 02|"; byte_test:2,>,40,0,relative,little; byte_test:2,>,733,4,relative,little; byte_test:1,!&,0x80,3,relative,little; content:"|80|"; within:1; distance:6; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,18872; reference:cve,2006-3431; reference:url,technet.microsoft.com/en-us/security/bulletin/ms06-059; classtype:attempted-user; sid:27213; rev:3;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel style handling overflow attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|C0 20 93 02|"; byte_test:2,>,40,0,relative,little; byte_test:2,>,733,4,relative,little; byte_test:1,!&,0x80,3,relative,little; content:"|80|"; within:1; distance:6; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,18872; reference:cve,2006-3431; reference:url,technet.microsoft.com/en-us/security/bulletin/ms06-059; classtype:attempted-user; sid:27212; rev:4;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel invalid Window2 BIFF record value attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|3E 02 0A 00|"; byte_test:1,!&,240,1,relative,little; byte_test:2,>=,0xff00,1,relative,little; content:"|00 00|"; within:2; distance:8; metadata:policy security-ips alert, service smtp; reference:cve,2012-0141; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-030; classtype:attempted-user; sid:27249; rev:3;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel Malformed Record Code Execution attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|01 00 02 00|"; content:"|9C 00 02 00|"; within:4; distance:2; byte_test:2,>,0x20,0,relative,little; content:"|19 00 02 00|"; within:4; distance:2; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,17101; reference:cve,2006-0031; classtype:attempted-user; sid:27635; rev:4;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel FngGroupCount record overflow attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|9C 00 02 00|"; byte_test:2,>,14,0,relative,little; byte_test:2,!=,16,0,relative,little; content:"|19 00 02 00|"; within:4; distance:2; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,18890; reference:cve,2006-1308; reference:cve,2008-0320; classtype:attempted-user; sid:27634; rev:2;) alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Word malformed OCXINFO element EoP attempt"; flow:to_server,established; file_data; content:"|06 00 00 88 29 00 00 0B 00 00 00 FF FF 06 00 00 00 06 00 AF 50 33 00 08 00 02 00 AC 3C 22 00 06 00 B0 50 33 00 08 00 02 00 DC A2|"; fast_pattern:only; metadata:policy balanced-ips drop, policy security-ips drop, service smtp; reference:cve,2013-3850; reference:url,technet.microsoft.com/en-us/security/bulletin/ms13-072; classtype:attempted-user; sid:27859; rev:3;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word malformed OCXINFO element EoP attempt"; flow:to_client,established; file_data; content:"|06 00 00 88 29 00 00 0B 00 00 00 FF FF 06 00 00 00 06 00 AF 50 33 00 08 00 02 00 AC 3C 22 00 06 00 B0 50 33 00 08 00 02 00 DC A2|"; fast_pattern:only; metadata:policy balanced-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2013-3850; reference:url,technet.microsoft.com/en-us/security/bulletin/ms13-072; classtype:attempted-user; sid:27858; rev:3;) alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Word document invalid cell count memory corruption attempt"; flow:to_server,established; flowbits:isset,file.doc; file_data; content:"|3F 60 04 00 0E C6 AA FD 24 36 DF AC 39 D6 B8 7B AB 2E 6B 7F CE F4 E7 FE 8A 0F 49 C4 CC C8 B3 30|"; fast_pattern:only; metadata:policy balanced-ips drop, policy security-ips drop, service smtp; reference:cve,2013-3854; reference:url,technet.microsoft.com/en-us/security/bulletin/MS13-072; classtype:attempted-user; sid:27857; rev:1;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word document invalid cell count memory corruption attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|3F 60 04 00 0E C6 AA FD 24 36 DF AC 39 D6 B8 7B AB 2E 6B 7F CE F4 E7 FE 8A 0F 49 C4 CC C8 B3 30|"; fast_pattern:only; metadata:policy balanced-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2013-3854; reference:url,technet.microsoft.com/en-us/security/bulletin/MS13-072; classtype:attempted-user; sid:27856; rev:1;) alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Word document invalid cell count memory corruption attempt"; flow:to_server,established; flowbits:isset,file.doc; file_data; content:"|D0 F0 C4 B5 A6 B5 A6 98 A6 98 89 C4 7C 70 7C 70 7C 70 62 55 49 55 49 55 62|"; fast_pattern:only; metadata:policy balanced-ips drop, policy security-ips drop, service smtp; reference:cve,2013-3856; reference:url,technet.microsoft.com/en-us/security/bulletin/MS13-072; classtype:attempted-user; sid:27855; rev:2;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word document invalid cell count memory corruption attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|D0 F0 C4 B5 A6 B5 A6 98 A6 98 89 C4 7C 70 7C 70 7C 70 62 55 49 55 49 55 62|"; fast_pattern:only; metadata:policy balanced-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2013-3856; reference:url,technet.microsoft.com/en-us/security/bulletin/MS13-072; classtype:attempted-user; sid:27854; rev:2;) alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Word invalid number of cells memory corruption attempt"; flow:to_server,established; flowbits:isset,file.doc; file_data; content:"|70 00 6B 00 2D 00 6B 00 67 00 72 00 65 00 73 00 2E 00 72 00 75 00 2F 00 00 00 E0 C9 EA 79 F9 BA|"; fast_pattern:only; metadata:policy balanced-ips drop, policy security-ips drop, service smtp; reference:cve,2013-3852; reference:url,technet.microsoft.com/en-us/security/bulletin/MS13-072; classtype:attempted-user; sid:27853; rev:2;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word invalid number of cells memory corruption attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|70 00 6B 00 2D 00 6B 00 67 00 72 00 65 00 73 00 2E 00 72 00 75 00 2F 00 00 00 E0 C9 EA 79 F9 BA|"; fast_pattern:only; metadata:policy balanced-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2013-3852; reference:url,technet.microsoft.com/en-us/security/bulletin/MS13-072; classtype:attempted-user; sid:27852; rev:2;) alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office SDTI signed integer underflow attempt"; flow:to_server,established; file_data; flowbits:isset,file.doc; content:"|00 00 0C 00|"; fast_pattern; content:"|FF FF|"; within:2; distance:-10; content:!"|00 00 00 00|"; within:4; distance:8; byte_test:1,!&,0x80,3,relative; byte_test:1,&,0x80,15,relative; byte_test:4,>,0,20,relative,little; byte_test:4,<=,4,20,relative,little; metadata:policy balanced-ips alert, policy security-ips alert, service smtp; reference:cve,2013-3848; reference:url,technet.microsoft.com/en-us/security/bulletin/MS13-072; classtype:attempted-user; sid:27851; rev:4;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office SDTI signed integer underflow attempt"; flow:to_client,established; file_data; flowbits:isset,file.doc; content:"|00 00 0C 00|"; fast_pattern; content:"|FF FF|"; within:2; distance:-10; content:!"|00 00 00 00|"; within:4; distance:8; byte_test:1,!&,0x80,3,relative; byte_test:1,&,0x80,15,relative; byte_test:4,>,0,20,relative,little; byte_test:4,<=,4,20,relative,little; metadata:policy balanced-ips alert, policy security-ips alert, service ftp-data, service http, service imap, service pop3; reference:cve,2013-3848; reference:url,technet.microsoft.com/en-us/security/bulletin/MS13-072; classtype:attempted-user; sid:27850; rev:3;) alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel invalid external defined names read AV attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|49 6E 64 65 70 65 6E 64 65 6E 63 65 20 44 61 79 5A 00 0D 00 05 05 23 00 01 00 00 00 00 60 B5 E3|"; fast_pattern:only; metadata:policy balanced-ips drop, policy security-ips drop, service smtp; reference:cve,2013-3158; reference:url,technet.microsoft.com/en-us/security/bulletin/MS13-073; classtype:attempted-user; sid:27825; rev:1;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel invalid external defined names read AV attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|49 6E 64 65 70 65 6E 64 65 6E 63 65 20 44 61 79 5A 00 0D 00 05 05 23 00 01 00 00 00 00 60 B5 E3|"; fast_pattern:only; metadata:policy balanced-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2013-3158; reference:url,technet.microsoft.com/en-us/security/bulletin/MS13-073; classtype:attempted-user; sid:27824; rev:1;) alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel PtgMemFunc zero-value cce-field read access violation attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|41 4D 34 36 34 39 42 33 36 32 07 00 2D 00 00 FF 3F 00 00 23|"; fast_pattern:only; metadata:policy balanced-ips drop, policy security-ips drop, service smtp; reference:cve,2013-1315; reference:url,technet.microsoft.com/en-us/security/bulletin/MS13-073; classtype:attempted-user; sid:27821; rev:3;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel PtgMemFunc zero-value cce-field read access violation attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|41 4D 34 36 34 39 42 33 36 32 07 00 2D 00 00 FF 3F 00 00 23|"; fast_pattern:only; metadata:policy balanced-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2013-1315; reference:url,technet.microsoft.com/en-us/security/bulletin/MS13-073; classtype:attempted-user; sid:27820; rev:3;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel ObjectLink invalid wLinkVar2 value attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|27 10|"; content:"|04 00|"; within:2; distance:2; byte_test:2,<,0xff,0,relative,little; byte_test:2,>,0x7cff,2,relative,little; byte_test:2,<,0xffff,2,relative,little; metadata:policy max-detect-ips drop, policy security-ips drop, service smtp; reference:bugtraq,53373; reference:cve,2012-0142; reference:url,technet.microsoft.com/en-us/security/bulletin/ms12-030; classtype:attempted-user; sid:27945; rev:6;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel rtMergeCells heap overflow attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|E5 00|"; byte_test:2,>,0,0,little,relative; byte_test:2,<,1027,2,little,relative; byte_extract:2,4,rwFirst,relative,multiplier 1,little; byte_test:2,=,rwFirst,0,little,relative; byte_test:2,>,0x3fff,4,little,relative; metadata:policy max-detect-ips drop, service smtp; reference:cve,2012-0185; reference:url,technet.microsoft.com/en-us/security/bulletin/ms12-030; classtype:attempted-user; sid:27948; rev:4;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel rtMergeCells heap overflow attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|E5 00|"; content:!"|00 00|"; within:2; content:"|1D 00 0F 00|"; within:4; distance:-21; byte_test:2,<,1027,19,little,relative; byte_test:2,>,0x3fff,27,little,relative; metadata:policy max-detect-ips drop, service smtp; reference:cve,2012-0185; reference:url,technet.microsoft.com/en-us/security/bulletin/ms12-030; classtype:attempted-user; sid:27947; rev:4;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel Workspace file FontCount record memory corruption attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|09 04 06 00 00 04 00 01|"; content:"|30 00|"; distance:0; byte_test:2,>,2,0,relative,little; content:"|00 00|"; within:2; distance:2; metadata:service smtp; reference:cve,2011-0103; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-021; classtype:attempted-user; sid:28103; rev:3;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel FngGroupCount record overflow attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|0B 02|"; content:"|00 00 00 00|"; within:4; distance:2; content:"|9C 00 02 00|"; within:50; fast_pattern; byte_test:2,>,0x50,0,relative,little; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,18890; reference:cve,2006-1308; classtype:attempted-user; sid:28113; rev:2;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel ShrFmla record use after free attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|7E 02 0A 00|"; content:"|06 00|"; within:50; distance:10; byte_jump:2,22,relative,little; content:"|BC 04|"; within:2; content:"|00|"; within:1; distance:8; byte_test:2,>,0x820,-9,relative,little; metadata:service smtp; reference:bugtraq,49476; reference:cve,2011-1986; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-072; classtype:attempted-user; sid:28137; rev:5;) # alert tcp any any -> $HOME_NET 25 (msg:"FILE-OFFICE Microsoft Office Word remote code execution attempt"; flow:to_server,established; flowbits:isset,file.doc; file_data; content:"|F6 03 00 00 FF 7F 12 D6 FC 12 D6 FC|"; fast_pattern:only; metadata:policy max-detect-ips drop, service smtp; reference:cve,2009-0563; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-027; classtype:attempted-user; sid:28133; rev:3;) # alert tcp any any -> $HOME_NET 25 (msg:"FILE-OFFICE Microsoft Office Word remote code execution attempt"; flow:to_server,established; flowbits:isset,file.doc; file_data; content:"|07 07 07 52 07 45 07 50 07 52 07 4F 07 07 07|"; fast_pattern:only; metadata:policy max-detect-ips drop, service smtp; reference:cve,2009-0563; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-027; classtype:attempted-user; sid:28132; rev:3;) # alert tcp any any -> $HOME_NET 25 (msg:"FILE-OFFICE Microsoft Office Word remote code execution attempt"; flow:to_server,established; flowbits:isset,file.doc; file_data; content:"|EA FF FF F3 F3 F5 E1 E1 FC FD DB E0 EC DE E7 DC DC E5 E1 DE DE EE E6 FA|"; fast_pattern:only; metadata:policy max-detect-ips drop, service smtp; reference:cve,2009-0563; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-027; classtype:attempted-user; sid:28131; rev:3;) # alert tcp any any -> $HOME_NET 25 (msg:"FILE-OFFICE Microsoft Office Word remote code execution attempt"; flow:to_server,established; flowbits:isset,file.doc; file_data; content:"|35 08 81 42 2A 01 43 4A 14 00 61 4A 14 00 70 68 00 00 00 00 00 20 15|"; fast_pattern:only; metadata:policy max-detect-ips drop, service smtp; reference:cve,2009-0563; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-027; classtype:attempted-user; sid:28130; rev:3;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word remote code execution attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|EA FF FF F3 F3 F5 E1 E1 FC FD DB E0 EC DE E7 DC DC E5 E1 DE DE EE E6 FA|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2009-0563; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-027; classtype:attempted-user; sid:28129; rev:3;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word remote code execution attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|35 08 81 42 2A 01 43 4A 14 00 61 4A 14 00 70 68 00 00 00 00 00 20 15|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2009-0563; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-027; classtype:attempted-user; sid:28128; rev:3;) alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Word 2003 macro byte opcode large data structure arbitrary code execution attempt"; flow:to_server,established; flowbits:isset,file.doc; file_data; content:"|82 39 26 41 B0 5D 5A D1|"; content:"|7F DE 64 36 C7 06 83|"; distance:0; metadata:policy balanced-ips drop, policy security-ips drop, service smtp; reference:cve,2013-3891; reference:url,technet.microsoft.com/en-us/security/bulletin/ms13-086; classtype:attempted-user; sid:28206; rev:2;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word 2003 macro byte opcode large data structure arbitrary code execution attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|82 39 26 41 B0 5D 5A D1|"; content:"|7F DE 64 36 C7 06 83|"; distance:0; metadata:policy balanced-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2013-3891; reference:url,technet.microsoft.com/en-us/security/bulletin/ms13-086; classtype:attempted-user; sid:28205; rev:2;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office TIFF filter buffer overflow attempt"; flow:to_client,established; flowbits:isset,file.tiff.big; file_data; content:"|D9 9F FF D9 00 1A 00 FE 00 04 00 00 00 0B FF FF FF FF 01 00 00 04 00 00 00 01 00 00 00 A0 01 01|"; fast_pattern:only; metadata:service ftp-data, service http, service imap, service pop3; reference:bugtraq,17732; reference:cve,2006-2025; reference:url,secunia.com/advisories/19838; classtype:attempted-user; sid:28391; rev:2;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office TIFF filter buffer overflow attempt"; flow:to_client,established; flowbits:isset,file.tiff.little; file_data; content:"|11 00 FE 00 04 00 01 00 00 00 00 00 00 00 00 01 03 00 01 00 00 00 05 00 00 00 01 01 03 00 01 00|"; fast_pattern:only; metadata:service ftp-data, service http, service imap, service pop3; reference:bugtraq,17732; reference:cve,2006-2025; reference:url,secunia.com/advisories/19838; classtype:attempted-user; sid:28390; rev:2;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Visio DXF file invalid memory allocation exploit attempt"; flow:to_server,established; flowbits:isset,file.dxf; file_data; content:"|0D 0A|HATCH|0D 0A|"; nocase; pcre:!"/^\s*[1-9][0-9]*\x0d\x0a/R"; metadata:policy max-detect-ips drop, service smtp; reference:cve,2008-1090; reference:url,technet.microsoft.com/en-us/security/bulletin/MS08-019; classtype:attempted-user; sid:28440; rev:2;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel rtToolbarDef record integer overflow attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|09 08 10 00 00 06|"; content:"|A7 00|"; fast_pattern; byte_test:2,>,2056,3,relative,little; byte_extract:2,0,size_of_record,relative,little; content:"|3C 00|"; within:2; distance:size_of_record; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2011-0097; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-021; classtype:attempted-user; sid:28550; rev:3;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel rtToolbarDef record integer overflow attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|09 08 08 00 00 05|"; fast_pattern:only; content:"|A7 00|"; byte_test:2,>,520,3,relative,little; byte_extract:2,0,size_of_record,relative,little; content:"|3C 00|"; within:2; distance:size_of_record; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2011-0097; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-021; classtype:attempted-user; sid:28549; rev:3;) alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel RealTimeData record memory corruption attempt"; flow:to_server,established; content:"|D0 CF 11 E0|"; depth:4; file_data; content:"|13 08|"; content:!"|00 00|"; within:2; byte_extract:2,0,size_of_record,relative,little; content:"|13 08 00 00 00 00 00 00 00 00|"; within:10; byte_test:4,>,size_of_record,6,relative,little; metadata:policy balanced-ips drop, policy security-ips drop, service smtp; reference:cve,2011-0101; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-021; classtype:attempted-user; sid:28546; rev:2;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel RealTimeData record memory corruption attempt"; flow:to_server,established; file_data; content:"|D0 CF 11 E0|"; depth:4; content:"|13 08|"; fast_pattern; content:!"|00 00|"; within:2; byte_extract:2,0,size_of_record,relative,little; content:"|00 00 00 00|"; within:4; distance:12; byte_test:4,>,size_of_record,0,relative,little; metadata:policy security-ips drop, service smtp; reference:cve,2011-0101; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-021; classtype:attempted-user; sid:28545; rev:2;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel RealTimeData record memory corruption attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|13 08|"; content:!"|00 00|"; within:2; byte_extract:2,0,size_of_record,relative,little; content:"|13 08 00 00 00 00 00 00 00 00|"; within:10; byte_test:4,>,size_of_record,6,relative,little; metadata:policy balanced-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2011-0101; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-021; classtype:attempted-user; sid:28544; rev:1;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel SerAuxTrend biff record corruption attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|4B 10|"; fast_pattern; content:"|00|"; within:1; distance:2; byte_test:1,>,0x06,0,relative; content:"|FF FF FF FF|"; within:4; distance:1; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,48159; reference:cve,2011-1274; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-045; classtype:attempted-user; sid:28794; rev:5;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office PowerPoint MasterPagePackedText structure CharacterFormatArrayOuterHeaderSize buffer overflow"; flow:to_client,established; flowbits:isset,file.ppt; file_data; content:"|6C 0C 10 52 00 00 00 10 00 04 00 00 00 21 00 00 00 01 00 20 00 00 00 01 00 00 00 00 00 0D 00 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2009-1137; reference:url,technet.microsoft.com/en-us/security/bulletin/ms09-017; classtype:attempted-user; sid:29033; rev:2;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office PowerPoint MasterPagePackedText structure CharacterFormatArrayOuterHeaderSize buffer overflow"; flow:to_client,established; flowbits:isset,file.ppt; file_data; content:"|6C 0C 80 52 00 00 00 10 00 04 00 00 00 21 00 00 00 01 00 20 00 00 00 01 00 00 00 00 00 0D 00 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2009-1137; reference:url,technet.microsoft.com/en-us/security/bulletin/ms09-017; classtype:attempted-user; sid:29032; rev:2;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel SERIES record sdtX memory corruption attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|03 10 0C 00|"; content:"|03 00|"; within:2; pcre:"/\x03\x10\x0c\x00.{12}\x33\x10[^\x34]*?(\x33\x10.*?\x34\x10)*?[^\x34]*?\x5b\x10/Osmi"; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-1847; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-030; classtype:attempted-user; sid:29264; rev:2;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS any (msg:"FILE-OFFICE Microsoft Office Excel SERIES record sdtX memory corruption attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|03 10 0C 00|"; content:"|03 00|"; within:2; pcre:"/\x03\x10\x0c\x00.{12}\x33\x10[^\x34]*?(\x33\x10.*?\x34\x10)*?[^\x34]*?\x5b\x10/Osmi"; metadata:policy max-detect-ips drop, service smtp; reference:cve,2012-1847; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-030; classtype:attempted-user; sid:29329; rev:2;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel SERIES record SerAuxErrBar sdtX memory corruption attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|03 10 0C 00|"; byte_test:2,<=,32767,4,relative,little; byte_test:2,<=,32767,6,relative,little; content:"|01 00|"; within:2; distance:8; byte_test:2,<=,32767,0,relative,little; byte_test:2,!=,1,-10,relative,little; content:"|4A 10 02 00 01 00 5B 10 0E 00|"; within:50; distance:222; metadata:policy max-detect-ips drop, policy security-ips drop, service smtp; reference:cve,2012-1847; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-030; classtype:attempted-user; sid:29328; rev:3;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel SERIES record SerAuxTrend sdtX memory corruption attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|03 10 0C 00|"; byte_test:2,<=,32767,4,relative,little; byte_test:2,<=,32767,6,relative,little; content:"|01 00|"; within:2; distance:8; byte_test:2,<=,32767,0,relative,little; byte_test:2,!=,1,-10,relative,little; content:"|4A 10 02 00 01 00 4B 10 1C 00|"; within:50; distance:222; metadata:policy max-detect-ips drop, policy security-ips drop, service smtp; reference:cve,2012-1847; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-030; classtype:attempted-user; sid:29327; rev:3;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel SERIES record sdtY memory corruption attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|03 10 0C 00|"; byte_test:2,<=,3,0,relative,little; content:"|03 00|"; within:2; distance:2; metadata:policy max-detect-ips drop, policy security-ips drop, service smtp; reference:cve,2012-1847; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-030; classtype:attempted-user; sid:29326; rev:3;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel country record arbitrary code execution attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|8C 00 04 00|"; byte_test:2,>,5,0,relative,little; content:"|18 00|"; within:2; distance:4; byte_test:1,&,0x20,2,relative,little; byte_test:2,>,14,16,relative,little; metadata:policy max-detect-ips drop, service smtp; reference:cve,2008-3006; reference:cve,2008-4266; reference:url,technet.microsoft.com/en-us/security/bulletin/ms08-043; reference:url,technet.microsoft.com/en-us/security/bulletin/ms08-074; classtype:attempted-user; sid:29404; rev:2;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word invalid sprmPNumRM record"; flow:established,to_client; flowbits:isset,file.doc; file_data; content:"|45 C6 80 01|"; fast_pattern:only; pcre:"/\x45\xC6\x80\x01.{7}[\x00-\x1F]{0,8}[\x20-\xff]/"; metadata:policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2014-0258; reference:url,technet.microsoft.com/en-us/security/bulletin/ms14-001; classtype:attempted-admin; sid:29726; rev:3;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Word invalid sprmPNumRM record"; flow:established,to_server; flowbits:isset,file.doc; file_data; content:"|45 C6 80 00|"; fast_pattern:only; pcre:"/\x45\xC6\x80\x00.{7}[\x00-\x1F]{0,8}[\x20-\xff]/"; metadata:policy security-ips drop, service smtp; reference:cve,2014-0258; reference:url,technet.microsoft.com/en-us/security/bulletin/ms14-001; classtype:attempted-admin; sid:29725; rev:2;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word invalid sprmPNumRM record"; flow:established,to_client; flowbits:isset,file.doc; file_data; content:"|45 C6 80 00|"; fast_pattern:only; pcre:"/\x45\xC6\x80\x00.{7}[\x00-\x1F]{0,8}[\x20-\xff]/"; metadata:policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2014-0258; reference:url,technet.microsoft.com/en-us/security/bulletin/ms14-001; classtype:attempted-admin; sid:29724; rev:3;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Word invalid sprmPNumRM record"; flow:established,to_server; flowbits:isset,file.doc; file_data; content:"|45 C6 80 01|"; fast_pattern:only; pcre:"/\x45\xC6\x80\x01.{7}[\x00-\x1F]{0,8}[\x20-\xff]/"; metadata:policy security-ips drop, service smtp; reference:cve,2014-0258; reference:url,technet.microsoft.com/en-us/security/bulletin/ms14-001; classtype:attempted-admin; sid:29723; rev:2;) alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Windows common controls stack buffer overflow via malicious toolbar and author attempt"; flow:to_server,established; flowbits:isset,file.doc; file_data; content:"Tran Duy Linh"; nocase; content:"CONTROL MSComctlLib.Toolbar.2"; fast_pattern:only; content:"Toolbar1"; nocase; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service smtp; reference:cve,2012-0158; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-027; classtype:attempted-user; sid:30166; rev:2;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Windows common controls stack buffer overflow via malicious toolbar and author attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"Tran Duy Linh"; nocase; content:"CONTROL MSComctlLib.Toolbar.2"; fast_pattern:only; content:"Toolbar1"; nocase; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-0158; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-027; classtype:attempted-user; sid:30165; rev:2;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Windows common controls stack buffer overflow via malicious MSComctlLib xls object attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"MSComctlLib"; fast_pattern:only; content:"VBA"; nocase; metadata:policy max-detect-ips drop, policy security-ips drop, service smtp; reference:cve,2012-0158; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-027; classtype:attempted-user; sid:30164; rev:2;) alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Windows common controls stack buffer overflow via malicious MSComctlLib object attempt"; flow:to_server,established; flowbits:isset,file.doc; file_data; content:"CONTROL MSComctlLib"; fast_pattern:only; content:"|90 90 90 90 90 90|"; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service smtp; reference:cve,2012-0158; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-027; classtype:attempted-user; sid:30163; rev:2;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Windows common controls stack buffer overflow via malicious MSComctlLib xls object attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"MSComctlLib"; fast_pattern:only; content:"VBA"; nocase; metadata:policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-0158; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-027; classtype:attempted-user; sid:30162; rev:2;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Windows common controls stack buffer overflow via malicious MSComctlLib object attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"CONTROL MSComctlLib"; fast_pattern:only; content:"|90 90 90 90 90 90|"; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-0158; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-027; classtype:attempted-user; sid:30161; rev:2;) alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Windows common controls stack buffer overflow via MIME HTML document attempt"; flow:to_server,established; file_data; content:"MIME-Version"; depth:12; nocase; content:"9181DC5F-E07D-418A-ACA6-8EEA1ECB8E9E"; content:".mso"; distance:0; content:"Content-Transfer-Encoding: base64"; within:250; distance:-100; nocase; content:"Content-Type: application/x-mso"; nocase; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service smtp; reference:cve,2012-0158; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-027; classtype:attempted-user; sid:30160; rev:2;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Windows common controls stack buffer overflow via MIME HTML document attempt"; flow:to_client,established; file_data; content:"MIME-Version"; depth:12; nocase; content:"9181DC5F-E07D-418A-ACA6-8EEA1ECB8E9E"; content:".mso"; distance:0; content:"Content-Transfer-Encoding: base64"; within:250; distance:-100; nocase; content:"Content-Type: application/x-mso"; nocase; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-0158; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-027; classtype:attempted-user; sid:30159; rev:2;) alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Windows common controls stack buffer overflow via MIME HTML document attempt"; flow:to_server,established; file_data; content:"MIME-Version"; depth:12; nocase; content:"C74190B6-8589-11d1-B16A-00C0F0283628"; content:".mso"; distance:0; content:"Content-Transfer-Encoding: base64"; within:250; distance:-100; nocase; content:"Content-Type: application/x-mso"; nocase; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service smtp; reference:cve,2012-0158; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-027; classtype:attempted-user; sid:30158; rev:2;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Windows common controls stack buffer overflow via MIME HTML document attempt"; flow:to_client,established; file_data; content:"MIME-Version"; depth:12; nocase; content:"C74190B6-8589-11d1-B16A-00C0F0283628"; content:".mso"; distance:0; content:"Content-Transfer-Encoding: base64"; within:250; distance:-100; nocase; content:"Content-Type: application/x-mso"; nocase; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-0158; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-027; classtype:attempted-user; sid:30157; rev:2;) alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Windows common controls stack buffer overflow via MIME HTML document attempt"; flow:to_server,established; file_data; content:"MIME-Version"; depth:12; nocase; content:"996BF5E0-8044-4650-ADEB-0B013914E99C"; content:".mso"; distance:0; content:"Content-Transfer-Encoding: base64"; within:250; distance:-100; nocase; content:"Content-Type: application/x-mso"; nocase; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service smtp; reference:cve,2012-0158; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-027; classtype:attempted-user; sid:30156; rev:2;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Windows common controls stack buffer overflow via MIME HTML document attempt"; flow:to_client,established; file_data; content:"MIME-Version"; depth:12; nocase; content:"996BF5E0-8044-4650-ADEB-0B013914E99C"; content:".mso"; distance:0; content:"Content-Transfer-Encoding: base64"; within:250; distance:-100; nocase; content:"Content-Type: application/x-mso"; nocase; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-0158; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-027; classtype:attempted-user; sid:30155; rev:2;) alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Windows common controls stack buffer overflow via MIME HTML document attempt"; flow:to_server,established; file_data; content:"MIME-Version"; depth:12; nocase; content:"BDD1F04B-858B-11D1-B16A-00C0F0283628"; content:".mso"; distance:0; content:"Content-Transfer-Encoding: base64"; within:250; distance:-100; nocase; content:"Content-Type: application/x-mso"; nocase; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service smtp; reference:cve,2012-0158; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-027; classtype:attempted-user; sid:30154; rev:2;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Windows common controls stack buffer overflow via MIME HTML document attempt"; flow:to_client,established; file_data; content:"MIME-Version"; depth:12; nocase; content:"BDD1F04B-858B-11D1-B16A-00C0F0283628"; content:".mso"; distance:0; content:"Content-Transfer-Encoding: base64"; within:250; distance:-100; nocase; content:"Content-Type: application/x-mso"; nocase; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-0158; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-027; classtype:attempted-user; sid:30153; rev:2;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel DbOrParamQry.fodbcConn parsing remote code execution attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|B0 F3 E0 71 2D B6 2D 9E 9F AC CF BB 47 FC F3 F8 FF 79 F1 CA EA DB 59 A7 2C 9B 7F 7C E5 CD B9 61 5B 6C BD 2E 77 3A BF FC|"; fast_pattern:only; metadata:service smtp; reference:cve,2010-0264; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-017; classtype:attempted-user; sid:30248; rev:2;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel DbOrParamQry.fodbcConn parsing remote code execution attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|E2 72 E9 8C B1 C7 D2 C3 DC B8 BB B9 3A E6 EF 8C 59 DC 28 FE 65 BF 1F 53 D2 6F C2 CE 03 2E 9F EB 7C 73 9C 70 8E E3 14 AC|"; fast_pattern:only; metadata:service smtp; reference:cve,2010-0264; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-017; classtype:attempted-user; sid:30247; rev:2;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel DbOrParamQry.fWeb parsing remote code execution attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|DC 00 0C 00|"; byte_test:1,!&,0x07,0,relative,little; byte_test:1,&,0x48,0,relative,little; content:"|CD 00|"; within:2; distance:12; metadata:service smtp; reference:cve,2010-0264; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-017; classtype:attempted-user; sid:30246; rev:2;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel DbOrParamQry.fWeb parsing remote code execution attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|DC 00 0C 00|"; byte_test:1,&,0x03,0,relative,little; byte_test:1,&,0x40,0,relative,little; content:"|CD 00|"; within:2; distance:12; metadata:service smtp; reference:cve,2010-0264; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-017; classtype:attempted-user; sid:30245; rev:2;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel DbOrParamQry.fOdbcConn parsing remote code execution attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|DC 00 0C 00|"; byte_test:1,&,0x06,0,relative,little; byte_test:1,&,0x08,0,relative,little; content:!"|00 00|"; within:2; distance:10; content:"|CD 00|"; within:2; distance:12; content:!"|00 00|"; within:2; metadata:service smtp; reference:cve,2010-0264; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-017; classtype:attempted-user; sid:30244; rev:2;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel malicious cce value following a PtgMemFunc token"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|06 00|"; byte_test:2,<,0x200,0,relative,little; byte_extract:2,0,formulaSize,relative,little; content:"|00|"; within:1; distance:15; content:"|03 00 29|"; within:formulaSize; distance:4; content:"|00 00|"; within:2; metadata:service smtp; reference:cve,2013-1315; reference:url,technet.microsoft.com/en-us/security/bulletin/MS13-073; classtype:attempted-user; sid:30243; rev:4;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel malicious cce value following a PtgMemFunc token"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|06 00|"; byte_test:2,<,0x200,0,relative,little; byte_extract:2,0,formulaSize,relative,little; content:"|00|"; within:1; distance:15; content:"|03 00 29|"; within:formulaSize; distance:4; content:"|00 00|"; within:2; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2013-1315; reference:url,technet.microsoft.com/en-us/security/bulletin/MS13-073; classtype:attempted-user; sid:30242; rev:4;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office PowerPoint out of bounds value remote code execution attempt"; flow:to_server,established; flowbits:isset,file.ppt; file_data; content:"|C3 0B 08|"; fast_pattern; byte_test:1,<,0x03,0,relative,little; byte_test:1,>,0x18,7,relative,little; content:"|C3 0B|"; distance:0; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,38104; reference:cve,2010-0032; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-004; classtype:attempted-user; sid:30941; rev:3;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Word WordPerfect converter buffer overflow attempt"; flow:to_server,established; file_data; content:"|FF|WPCF"; depth:5; content:"|08 11 02 00 00 00 C6 00 00 00|"; distance:0; byte_jump:4,0,relative,little,from_beginning,post_offset 32; byte_test:1,>,5,0,relative; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,34469; reference:cve,2009-0088; reference:url,technet.microsoft.com/en-us/security/bulletin/ms09-010; classtype:attempted-user; sid:31032; rev:2;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word WordPerfect converter buffer overflow attempt"; flow:to_client,established; file_data; content:"|FF|WPCF"; depth:5; content:"|08 11 02 00 00 00 C6 00 00 00|"; distance:0; byte_jump:4,0,relative,little,from_beginning,post_offset 32; byte_test:1,>,5,0,relative; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,34469; reference:cve,2009-0088; reference:url,technet.microsoft.com/en-us/security/bulletin/ms09-010; classtype:attempted-user; sid:31031; rev:2;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel rtToolbarDef record integer overflow attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|A7 00|"; content:"|DF D6 D5 3B|"; within:4; distance:11; metadata:service smtp; reference:cve,2011-0097; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-021; classtype:attempted-user; sid:31127; rev:2;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel rtToolbarDef record integer overflow attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|09 08 10 00 00 06|"; content:"|A7 00|"; fast_pattern; byte_test:2,>,2056,3,relative,little; byte_extract:2,0,size_of_record,relative,little; content:"|3C 00|"; within:2; distance:size_of_record; metadata:service smtp; reference:cve,2011-0097; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-021; classtype:attempted-user; sid:31126; rev:2;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel rtToolbarDef record integer overflow attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|09 08 08 00 00 05|"; fast_pattern:only; content:"|A7 00|"; byte_test:2,>,520,3,relative,little; byte_extract:2,0,size_of_record,relative,little; content:"|3C 00|"; within:2; distance:size_of_record; metadata:service smtp; reference:cve,2011-0097; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-021; classtype:attempted-user; sid:31125; rev:2;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel Qsir and Qsif record remote code execution attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|06 08|"; content:"|06 08|"; within:2; distance:2; byte_test:1,&,0x10,16,relative; byte_test:1,!&,0x40,16,relative; byte_test:4,>,0,18,relative,little; content:"|07 08|"; distance:0; content:"|07 08 00 00|"; within:4; distance:2; byte_test:1,&,8,0,relative; byte_test:1,<,0x10,2,relative; metadata:policy max-detect-ips drop, service smtp; reference:cve,2009-1134; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-021; classtype:attempted-user; sid:31374; rev:2;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Word Converter sprmTTextFflow overflow attempt"; flow:to_server,established; file_data; content:"|29 76 00 FF E0 01 13 D6 30 00 00 00 FF 04 01 00 00|"; fast_pattern:only; metadata:service smtp; reference:bugtraq,47236; reference:cve,2011-0028; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-033; classtype:attempted-user; sid:31379; rev:3;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Word Converter sprmTSplit overflow attempt"; flow:to_server,established; file_data; content:"|25 56 00 FF 05 D6 18 04 01 00 00 04 01|"; fast_pattern; content:"|08 D6 1A 00 01 94 FF 2C 22 00 06 98 22|"; within:50; metadata:service smtp; reference:bugtraq,47236; reference:cve,2011-0028; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-033; classtype:attempted-user; sid:31378; rev:3;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office thumbnail bitmap invalid biClrUsed attempt"; flow:to_server,established; file_data; content:"|C0 9C 83 4A FF F8 CE 11 A0 6B 00 AA 00 A7 11 91 30 00 00 00|"; content:"T|00|h|00|u|00|m|00|b|00|n|00|a|00|i|00|l|00 00 00 41 00 00 00|"; distance:0; content:"|28 00 00 00|"; within:4; distance:4; pcre:"/^(?=.{10}[\x01\x04\x08\x16\x24\x32]\x00)(.{3}[\x55-\xFF]|.{31}[\x80-\xFF])/sR"; metadata:policy max-detect-ips drop, service smtp; reference:cve,2010-3970; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-006; classtype:attempted-user; sid:31421; rev:3;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office thumbnail bitmap invalid biClrUsed attempt"; flow:to_server,established; flowbits:isset,file.doc; file_data; content:"|E0 85 9F F2 F9 4F 68 10 AB 91 08 00 2B 27 B3 D9 30 00 00 00|"; content:"|11 00 00 00|"; distance:0; content:"|47 00 00 00|"; distance:0; content:"|08 00 00 00 28 00 00 00|"; within:8; distance:8; pcre:"/^(?=.{10}[\x01\x04\x08\x16\x24\x32]\x00)(.{3}[\x55-\xFF]|.{31}[\x80-\xFF])/sR"; metadata:policy max-detect-ips drop, service smtp; reference:cve,2010-3970; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-006; classtype:attempted-user; sid:31420; rev:3;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel malformed chart arbitrary code execution attempt"; flow:to_server,established; flowbits:isset,file.xls|file.ole; file_data; content:"|41 10 12 00|"; byte_test:2,>,1,0,relative,little; metadata:policy max-detect-ips drop, service smtp; reference:cve,2008-3004; reference:cve,2011-1987; reference:url,technet.microsoft.com/en-us/security/bulletin/MS08-043; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-072; classtype:attempted-user; sid:31441; rev:2;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office PowerPoint improper filename remote code execution attempt"; flow:to_server,established; content:"powerpoint"; fast_pattern:only; pcre:"/Content\x2DDisposition\x3A\s*attachment[^\x0D\x0A]+name\x3D[^\x0D\x0A\x5C\x2F\x3A\x2A\x3F\x3C\x3E\x7C\x3D\s]{200}/i"; metadata:policy max-detect-ips drop, service smtp; reference:cve,2010-0029; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-004; classtype:attempted-user; sid:31437; rev:2;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel SXDB record memory corruption attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|C6 00|"; byte_extract:2,14,cfdbTot,relative; byte_test:2,>,cfdbTot,-4,relative; content:"|B2 00|"; distance:0; byte_test:2,>,0,2,relative; byte_test:2,>,0,4,relative; metadata:service smtp; reference:cve,2009-3127; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-067; classtype:attempted-user; sid:31436; rev:1;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel SXDB record memory corruption attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|C6 00|"; byte_extract:2,14,cfdbTot,relative; byte_test:2,>,cfdbTot,-4,relative; content:"|B2 00|"; distance:0; byte_test:2,>,0,2,relative; byte_test:2,>,0,4,relative; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2009-3127; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-067; classtype:attempted-user; sid:31435; rev:1;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Word Section Table Array Buffer Overflow attempt"; flow:to_server,established; flowbits:isset,file.doc; file_data; content:"|24 00 61 24 03 00 00 00 00 00 00 00 D1 50 00 00 04 00 00 AC 00 00 00 00 FF FF FF FF 00 00 00 00 CE|"; fast_pattern:only; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,22225; reference:cve,2007-0515; classtype:attempted-user; sid:31434; rev:2;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel PtgName invalid index exploit attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|06 00 2F 00 00 00 02 00 0F 00 00 00 20 01 F2 00 FF FF 00 00 6C 00 9C FC 19 00 23 AB B6 00 C0 17|"; fast_pattern:only; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,43650; reference:cve,2010-3235; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-080; classtype:attempted-user; sid:31476; rev:3;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel PtgName invalid index exploit attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|06 00 2F 00 00 00 02 00 0F 00 00 00 20 01 F2 00 FF FF 00 00 6C 00 9C FC 19 00 23 AB B6 00 C0 17|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,43650; reference:cve,2010-3235; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-080; classtype:attempted-user; sid:31475; rev:3;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel PtgName invalid index exploit attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|1D 00 00 00 FF FF 21 00 34 02 C7 FC 1E 00 23 30 00 00 00 17|"; fast_pattern:only; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,43650; reference:cve,2010-3235; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-080; classtype:attempted-user; sid:31474; rev:3;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel PtgName invalid index exploit attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|06 00 91 00 07 00 01 00 41 00 00 00 E0 29 BD 04 FF FF 00 00 05 00 01 FF 1E 00 23 02 30 00 00 17 0A 00 43 6F 6E 6E 65 63 74 69 6F 6E 60 02|"; fast_pattern:only; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,43650; reference:cve,2010-3235; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-080; classtype:attempted-user; sid:31473; rev:3;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Malformed MSODrawing Record attempt"; flow:to_server,established; flowbits:isset,file.ole; file_data; content:"|02 F0|"; byte_test:4,>,0,0,relative; content:"|08 F0|"; within:2; distance:6; content:"|04 F0|"; within:2; distance:22; byte_test:4,>,0,0,relative; content:"|09 F0|"; within:2; distance:6; byte_test:4,>,0,0,relative; byte_test:4,=,0,-16,relative; content:!"|03 F0|"; within:2; distance:-18; metadata:policy max-detect-ips drop, service smtp; reference:cve,2010-0243; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-003; classtype:attempted-user; sid:31462; rev:3;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel Malformed MSODrawing Record attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|EC 00|"; byte_test:2,>,0,0,relative; content:"|02 F0|"; within:2; distance:4; byte_test:4,>,0,0,relative; content:"|08 F0|"; within:2; distance:6; content:"|04 F0|"; within:2; distance:22; byte_test:4,>,0,0,relative; content:"|09 F0|"; within:2; distance:6; byte_test:4,>,0,0,relative; byte_test:4,=,0,-16,relative; content:!"|03 F0|"; within:2; distance:-18; metadata:policy max-detect-ips drop, service smtp; reference:cve,2010-0243; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-003; classtype:attempted-user; sid:31461; rev:3;) alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Access memory corruption attempt"; flow:to_server,established; file_data; content:"|C5 02 3F 83 01 FE 8B 05 E0 2F B1 0D 01 97 0C 50|"; fast_pattern:only; metadata:policy balanced-ips drop, policy security-ips drop, service smtp; reference:cve,2013-3155; reference:url,technet.microsoft.com/en-us/security/bulletin/MS13-074; classtype:attempted-user; sid:31537; rev:2;) alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Access memory corruption attempt"; flow:to_server,established; file_data; content:"|02 09 04 87 04 17 B9 02 3F 83 01 FE 8B 05 B8 00|"; fast_pattern:only; metadata:policy balanced-ips drop, policy security-ips drop, service smtp; reference:cve,2013-3155; reference:url,technet.microsoft.com/en-us/security/bulletin/MS13-074; classtype:attempted-user; sid:31536; rev:2;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Access memory corruption attempt"; flow:to_client,established; file_data; content:"|C5 02 3F 83 01 FE 8B 05 E0 2F B1 0D 01 97 0C 50|"; fast_pattern:only; metadata:policy balanced-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2013-3155; reference:url,technet.microsoft.com/en-us/security/bulletin/MS13-074; classtype:attempted-user; sid:31535; rev:2;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Access memory corruption attempt"; flow:to_client,established; file_data; content:"|02 09 04 87 04 17 B9 02 3F 83 01 FE 8B 05 B8 00|"; fast_pattern:only; metadata:policy balanced-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2013-3155; reference:url,technet.microsoft.com/en-us/security/bulletin/MS13-074; classtype:attempted-user; sid:31534; rev:2;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel invalid Lbl record attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|09 00|"; depth:2; content:"scen_num|1E|"; distance:0; byte_test:1,<,0x7FFF,0,relative,little; metadata:service smtp; reference:bugtraq,49478; reference:cve,2011-1988; reference:url,technet.microsoft.com/en-us/security/bulletin/ms11-072; classtype:attempted-user; sid:31579; rev:2;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Word global array index heap overflow attempt"; flow:to_server,established; flowbits:isset,file.doc|file.ole; file_data; content:"|31 90|"; content:"|1F B0|"; within:64; content:"|33 50|"; within:64; fast_pattern; byte_test:4,>,5,0,relative,little; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,32583; reference:cve,2008-4026; classtype:attempted-user; sid:31562; rev:3;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel TXO and OBJ records parsing stack memory corruption attempt"; flow:to_server,established; flowbits:isset,file.xls; flowbits:isnotset,cve.2008-4265; file_data; content:"|5D 00|"; depth:5000; content:"|00 00 00 00|"; within:4; distance:12; content:"|00 00 00 00 00 00 00 00|"; within:8; distance:4; content:"|B6 01|"; within:300; distance:-300; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,32618; reference:cve,2008-4265; reference:url,technet.microsoft.com/en-us/security/bulletin/MS08-074; classtype:attempted-user; sid:31592; rev:2;) alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel TXO and OBJ records parsing stack memory corruption attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|EB 00|"; content:"|0F 00 00 F0|"; within:4; distance:2; flowbits:set,cve.2008-4265; flowbits:noalert; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,32618; reference:cve,2008-4265; reference:url,technet.microsoft.com/en-us/security/bulletin/MS08-074; classtype:misc-activity; sid:31591; rev:2;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Outlook mailto injection attempt"; flow:to_server,established; file_data; content:"mailto:"; fast_pattern:only; pcre:"/\x3D[\x22\x27]mailto\x3A[^>]*?(\x26quot\x3B|\x26\x2334)[^>]*?(\x2f|\x2D)/i"; metadata:policy max-detect-ips drop, service smtp; reference:cve,2004-0121; classtype:attempted-user; sid:31752; rev:5;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Outlook mailto injection attempt"; flow:to_client,established; file_data; content:"mailto:"; fast_pattern:only; pcre:"/\x3D[\x22\x27]mailto\x3A[^>]*?(\x26quot\x3B|\x26\x2334)[^>]*?(\x2f|\x2D)/i"; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2004-0121; classtype:attempted-user; sid:31751; rev:4;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Word rich text format unexpected field type memory corruption attempt 3"; flow:to_server,established; flowbits:isset,file.rtf; file_data; content:"|5C|datafield |5C|jpegblip"; fast_pattern:only; metadata:policy max-detect-ips drop, service smtp; reference:cve,2010-1901; reference:url,technet.microsoft.com/en-us/security/bulletin/ms10-056; classtype:attempted-user; sid:31845; rev:3;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Word rich text format unexpected field type memory corruption attempt 2"; flow:to_server,established; flowbits:isset,file.rtf; file_data; content:"|5C|datafield |5C|pngblip"; fast_pattern:only; metadata:policy max-detect-ips drop, service smtp; reference:cve,2010-1901; reference:url,technet.microsoft.com/en-us/security/bulletin/ms10-056; classtype:attempted-user; sid:31844; rev:3;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Word rich text format unexpected field type memory corruption attempt 1"; flow:to_server,established; flowbits:isset,file.rtf; file_data; content:"|5C|datafield |5C|emfblip"; fast_pattern:only; metadata:policy max-detect-ips drop, service smtp; reference:cve,2010-1901; reference:url,technet.microsoft.com/en-us/security/bulletin/ms10-056; classtype:attempted-user; sid:31843; rev:3;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel FtCbls remote code execution attempt"; flow:to_server,established; file_data; content:"|D0 CF 11 E0|"; depth:4; content:"|00 5D 00 36 00 15 00 12 00 0B 00 01 00 11 00 08 9E 4D 02 48 8E 4D 02 00 00 00 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service smtp; reference:cve,2009-0557; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-021; classtype:attempted-admin; sid:31876; rev:2;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel FtCbls remote code execution attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|00 5D 00 36 00 15 00 12 00 0B 00 01 00 11 00 08 9E 4D 02 48 8E 4D 02 00 00 00 00 00 0C 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2009-0557; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-021; classtype:attempted-admin; sid:31875; rev:2;) alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt"; flow:to_server,established; file_data; content:"|40 00 00 00 00 D2 49 6B 00 00 00 00 40 00 00 00 00 4C 10 5F 20 E3 C6 01 40 00 00 00 00 1E 5A CA 20 E3 C6 01|"; fast_pattern:only; content:"|FE FF 00 00|"; content:"|02 00 00 00 A8 03 00 00 1E|"; within:9; distance:180; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service smtp; reference:cve,2012-0158; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-027; classtype:attempted-user; sid:31927; rev:2;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt"; flow:to_client,established; file_data; content:"|40 00 00 00 00 D2 49 6B 00 00 00 00 40 00 00 00 00 4C 10 5F 20 E3 C6 01 40 00 00 00 00 1E 5A CA 20 E3 C6 01|"; fast_pattern:only; content:"|FE FF 00 00|"; content:"|02 00 00 00 A8 03 00 00 1E|"; within:9; distance:180; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-0158; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-027; classtype:attempted-user; sid:31926; rev:2;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office .CGM file cell array heap overflow attempt"; flow:to_client,established; file_data; content:"BegPic|3B|"; content:"BegPicBody|3B|"; distance:0; content:"CellArray|0A|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-3945; reference:cve,2012-2524; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-105; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-057; classtype:attempted-user; sid:32064; rev:4;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office .CGM file cell array heap overflow attempt"; flow:to_server,established; file_data; content:"|41 3F 80 14 00 00 00 1F 00 1F 00 00 00 1F 00 1F 00 20 00 20 00 00 00 00 05 B8 80 80 FF FF FF 00 01|"; fast_pattern:only; metadata:policy max-detect-ips drop, policy security-ips drop, service smtp; reference:cve,2010-3945; reference:cve,2012-2524; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-105; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-057; classtype:attempted-user; sid:32063; rev:3;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office .CGM file cell array heap overflow attempt"; flow:to_server,established; file_data; content:"BegPic|3B|"; content:"BegPicBody|3B|"; distance:0; content:"CellArray|0A|"; fast_pattern:only; metadata:policy max-detect-ips drop, service smtp; reference:cve,2010-3945; reference:cve,2012-2524; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-105; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-057; classtype:attempted-user; sid:32062; rev:4;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel MalformedPalette Record Memory Corruption attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|80 07 FF 93 02 04 00 00 80 00 FF 93 02 04 00 14 80 05 FF 92 00 B2 00 A0 00 41 41 41 41 41 41 41|"; fast_pattern:only; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,21922; reference:cve,2007-0031; classtype:attempted-user; sid:32095; rev:2;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel MalformedPalete Record Memory Corruption attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|00 00 80 00 FF 93 02 04 00 14 80 05 FF 92 00 E2 00 80 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,21922; reference:cve,2007-0031; classtype:attempted-user; sid:32094; rev:2;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel malformed file format parsing code execution attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|02 00 09 00 00 00 02 00 40 00 00 03 00 05 00 09 00 FF FF FF FF 41 15 00 01 00 05 00 09 00 01 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service smtp; reference:cve,2006-0028; reference:url,technet.microsoft.com/en-us/security/bulletin/MS06-012; classtype:attempted-user; sid:32083; rev:4;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel Malformed Filter Records Handling Code Execution attempt"; flow:to_server,established; flowbits:isset,file.xls; content:"|43 6F 6C 75 6D 6E 20 42 3F 9B 00 00 00 9D 00 02 00 02 00 9E 00 1D 00 33 00 04 2A 06 02 8C 23 01 01 04 01 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,23780; reference:cve,2007-1214; classtype:attempted-user; sid:32082; rev:2;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel malformed FBI record buffer overflow attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|68 10 0A 00|"; byte_test:2,>,32767,8,relative,little; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,23826; reference:cve,2007-1203; reference:cve,2007-1747; reference:url,technet.microsoft.com/en-us/security/bulletin/ms07-023; classtype:attempted-user; sid:32132; rev:2;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel malformed FBI record buffer overflow attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|60 10 0A 00|"; byte_test:2,>,32767,8,relative,little; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,23826; reference:cve,2007-1203; reference:url,technet.microsoft.com/en-us/security/bulletin/ms07-023; classtype:attempted-user; sid:32131; rev:2;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel rtWnDesk record memory corruption exploit attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"8|00 04 00|"; byte_test:2,>,32767,0,relative,little; metadata:policy max-detect-ips drop, service smtp; reference:cve,2007-3890; reference:url,technet.microsoft.com/en-us/security/bulletin/ms07-044; classtype:attempted-user; sid:32122; rev:2;) alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Word styleWithEffects use-after-free attempt"; flow:to_server,established; flowbits:isset,file.docx; file_data; content:"|E2 EC 9C B5 F6 1B C6 B2 CD 34 06 86 4B 3A E9 5F 3F 12 60 0C 08 09 24 EE 46 C9 43 62 5B 94 E1 2B|"; fast_pattern:only; metadata:policy balanced-ips drop, policy security-ips drop, service smtp; reference:cve,2014-4117; reference:url,technet.microsoft.com/en-us/security/bulletin/ms14-061; classtype:attempted-user; sid:32148; rev:2;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word styleWithEffects use-after-free attempt"; flow:to_client,established; flowbits:isset,file.docx; file_data; content:"|E2 EC 9C B5 F6 1B C6 B2 CD 34 06 86 4B 3A E9 5F 3F 12 60 0C 08 09 24 EE 46 C9 43 62 5B 94 E1 2B|"; fast_pattern:only; metadata:policy balanced-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2014-4117; reference:url,technet.microsoft.com/en-us/security/bulletin/ms14-061; classtype:attempted-user; sid:32147; rev:2;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel style record overflow attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|E0 00 14 00|"; byte_test:1,&,0x04,4,relative,little; byte_test:1,!&,0x08,4,relative,little; byte_test:1,&,0x10,4,relative,little; byte_test:1,&,0x20,4,relative,little; byte_test:1,&,0x40,4,relative,little; byte_test:1,&,0x80,4,relative,little; byte_test:1,=,255,5,relative,little; content:"|93 02 04 00|"; distance:0; byte_test:1,>=,160,0,relative,little; byte_test:1,>=,8,1,relative,little; byte_test:1,!&,0x10,1,relative,little; byte_test:1,!&,0x20,1,relative,little; byte_test:1,!&,0x40,1,relative,little; metadata:policy max-detect-ips drop, service smtp; reference:cve,2008-0114; reference:url,technet.microsoft.com/en-us/security/bulletin/MS08-014; classtype:attempted-user; sid:32206; rev:2;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office invalid MS-OGRAPH DataFormat buffer overflow attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|06 10 08 00 FF FF|"; byte_test:2,>,255,2,little,relative; byte_extract:2,0,yi,little,relative; byte_test:2,>,yi,0,little,relative; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,49517; reference:cve,2011-1990; reference:url,technet.microsoft.com/en-us/security/bulletin/ms11-072; classtype:attempted-user; sid:32377; rev:4;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel ObjBiff validation exploit attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|09 08 08 00 00 05|"; content:"|CD 07|"; within:2; distance:4; content:"|85 00|"; distance:0; content:"|06|"; within:1; distance:7; content:"|5D 00|"; content:"|14 00|"; within:2; distance:6; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2011-1273; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-045; classtype:attempted-user; sid:32517; rev:2;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel ObjBiff validation exploit attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|09 08 08 00 00 05|"; content:"|CD 07|"; within:2; distance:4; content:"|85 00|"; distance:0; content:"|02|"; within:1; distance:7; content:"|5D 00|"; content:"|14 00|"; within:2; distance:6; metadata:service smtp; reference:cve,2011-1273; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-045; classtype:attempted-user; sid:32516; rev:2;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel ObjBiff validation exploit attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|09 08 08 00 00 05|"; content:"|CD 07|"; within:2; distance:4; content:"|85 00|"; distance:0; content:"|06|"; within:1; distance:7; content:"|5D 00|"; content:"|14 00|"; within:2; distance:6; metadata:service smtp; reference:cve,2011-1273; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-045; classtype:attempted-user; sid:32515; rev:2;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel ObjBiff validation exploit attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|09 08 08 00 00 05|"; content:"|CD 07|"; within:2; distance:4; content:"|85 00|"; distance:0; content:"|02|"; within:1; distance:7; content:"|5D 00|"; content:"|14 00|"; within:2; distance:6; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2011-1273; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-045; classtype:attempted-user; sid:32514; rev:2;) alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Word bOffset value overflow attempt"; flow:to_server,established; flowbits:isset,file.doc; file_data; content:"|0A 26 00 0B 46 02 00 0D C6 08 00 02 30 FD 02 0D 00 00 16 24 01 2A 24 01 49 66 02 00 00 00 67 64|"; fast_pattern:only; metadata:policy balanced-ips drop, policy security-ips drop, service smtp; reference:cve,2014-6335; reference:url,technet.microsoft.com/en-us/security/bulletin/MS14-065; classtype:attempted-user; sid:32477; rev:3;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word bOffset value overflow attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|0A 26 00 0B 46 02 00 0D C6 08 00 02 30 FD 02 0D 00 00 16 24 01 2A 24 01 49 66 02 00 00 00 67 64|"; fast_pattern:only; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2014-6335; reference:url,technet.microsoft.com/en-us/security/bulletin/MS14-065; classtype:attempted-user; sid:32476; rev:3;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Word fcPlfguidUim out-of-bounds attempt"; flow:to_server,established; flowbits:isset,file.doc; file_data; content:"|FF FF FF FF FF FF FF FF EC A5 C1 00|"; content:"|00 00 00 00|"; within:4; distance:10; content:"|0E 00|"; within:2; distance:14; content:"|16 00|"; within:2; distance:28; byte_test:2,>=,0x0088,88,relative,little; byte_test:4,>,0x00ffffff,978,relative,little; metadata:policy security-ips drop, service smtp; reference:cve,2014-6334; reference:url,technet.microsoft.com/en-us/security/bulletin/MS14-069; classtype:attempted-user; sid:32435; rev:5;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Word lcbPlcffndTxt out-of-bounds attempt"; flow:to_server,established; flowbits:isset,file.doc; file_data; content:"|FF FF FF FF FF FF FF FF EC A5 C1 00|"; content:"|00 00 00 00|"; within:4; distance:10; content:"|0E 00|"; within:2; distance:14; content:"|16 00|"; within:2; distance:28; byte_test:2,>=,0x005D,88,relative,little; byte_test:4,>,0x00ffffff,118,relative,little; metadata:policy security-ips drop, service smtp; reference:cve,2014-6334; reference:url,technet.microsoft.com/en-us/security/bulletin/MS14-069; classtype:attempted-user; sid:32434; rev:5;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word fcPlfguidUim out-of-bounds attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|FF FF FF FF FF FF FF FF EC A5 C1 00|"; content:"|00 00 00 00|"; within:4; distance:10; content:"|0E 00|"; within:2; distance:14; content:"|16 00|"; within:2; distance:28; byte_test:2,>=,0x0088,88,relative,little; byte_test:4,>,0x00ffffff,978,relative,little; metadata:policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2014-6334; reference:url,technet.microsoft.com/en-us/security/bulletin/MS14-069; classtype:attempted-user; sid:32433; rev:5;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word lcbPlcffndTxt out-of-bounds attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|FF FF FF FF FF FF FF FF EC A5 C1 00|"; content:"|00 00 00 00|"; within:4; distance:10; content:"|0E 00|"; within:2; distance:14; content:"|16 00|"; within:2; distance:28; byte_test:2,>=,0x005D,88,relative,little; byte_test:4,>,0x00ffffff,118,relative,little; metadata:policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2014-6334; reference:url,technet.microsoft.com/en-us/security/bulletin/MS14-069; classtype:attempted-user; sid:32432; rev:5;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Word document malicious lcbSttbfBkmkArto value attempt"; flow:to_server,established; flowbits:isset,file.doc; file_data; content:"|FF FF FF FF FF FF FF FF EC A5 C1 00|"; content:"|16 00|"; within:2; distance:58; content:"|B7 00|"; within:2; distance:88; isdataat:1400,relative; content:!"|00 00 00 00|"; within:4; distance:1396; metadata:service smtp; reference:cve,2014-6333; reference:url,technet.microsoft.com/en-us/security/bulletin/MS14-069; classtype:attempted-user; sid:32429; rev:3;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word document malicious lcbSttbfBkmkArto value attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|FF FF FF FF FF FF FF FF EC A5 C1 00|"; content:"|16 00|"; within:2; distance:58; content:"|B7 00|"; within:2; distance:88; isdataat:1400,relative; content:!"|00 00 00 00|"; within:4; distance:1396; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2014-6333; reference:url,technet.microsoft.com/en-us/security/bulletin/MS14-069; classtype:attempted-user; sid:32428; rev:3;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel Selection exploit attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|1D 00 0F 00 03|"; byte_test:2,>,0x1f00,6,relative,little; metadata:service smtp; reference:cve,2011-1277; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-045; classtype:attempted-user; sid:32589; rev:3;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel Selection exploit attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|1D 00 0F 00 03|"; byte_test:2,>,0x1f00,6,relative,little; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2011-1277; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-045; classtype:attempted-user; sid:32588; rev:3;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel Series record exploit attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|03 10 0C 00|"; content:"|00 01 00|"; within:3; distance:1; byte_test:1,&,0x80,1,relative,little; content:"|33 10 00 00|"; within:4; distance:8; metadata:service smtp; reference:cve,2011-1278; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-045; classtype:attempted-user; sid:32587; rev:2;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel DV record buffer overflow attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|B2 01 12 00|"; content:"|BE 01|"; within:2; distance:18; metadata:policy max-detect-ips drop, service smtp; reference:cve,2011-0105; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-021; classtype:attempted-user; sid:32625; rev:3;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Works 9 and Word 12 converter heap overflow attempt"; flow:to_server,established; file_data; content:"CHNKWKS "; content:"|F8 01|"; within:2; distance:16; content:"|18 00|"; within:2; distance:6; byte_test:1,>,0x18,22,relative; metadata:policy max-detect-ips drop, policy security-ips drop, service smtp; reference:cve,2012-0177; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-028; classtype:attempted-user; sid:32644; rev:2;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Works 9 and Word 12 converter heap overflow attempt"; flow:to_server,established; file_data; content:"CHNKWKS"; byte_test:2,>,0x18,48,relative,little; content:!"|18 00|"; within:2; distance:48; metadata:policy max-detect-ips drop, policy security-ips drop, service smtp; reference:cve,2012-0177; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-028; classtype:attempted-user; sid:32643; rev:2;) alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel remote code execution attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|08 02 18 00 07 00 00 00 0A 00 2C 01 00 00 00 00 40 01 0F 00 08 02 10 00 08 00 00 00 0A 00 2C 01|"; fast_pattern:only; metadata:policy balanced-ips drop, policy security-ips drop, service smtp; reference:cve,2014-6361; reference:url,technet.microsoft.com/en-us/security/bulletin/MS14-083; classtype:attempted-user; sid:32719; rev:1;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel remote code execution attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|08 02 18 00 07 00 00 00 0A 00 2C 01 00 00 00 00 40 01 0F 00 08 02 10 00 08 00 00 00 0A 00 2C 01|"; fast_pattern:only; metadata:policy balanced-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2014-6361; reference:url,technet.microsoft.com/en-us/security/bulletin/MS14-083; classtype:attempted-user; sid:32718; rev:1;) alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Word array index out-of-bounds attempt"; flow:to_server,established; flowbits:isset,file.doc; file_data; content:"|0F 84 80 16 11 84 98 14 A4 90 01 00 05 1C 00 13 A4 A0 00 14 A4 A0 00 00 4E 4A 07 00 51 4A 07 00|"; fast_pattern:only; metadata:policy balanced-ips drop, policy security-ips drop, service smtp; reference:cve,2014-6356; reference:url,technet.microsoft.com/en-us/security/bulletin/MS14-081; classtype:attempted-user; sid:32712; rev:1;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word array index out-of-bounds attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|0F 84 80 16 11 84 98 14 A4 90 01 00 05 1C 00 13 A4 A0 00 14 A4 A0 00 00 4E 4A 07 00 51 4A 07 00|"; fast_pattern:only; metadata:policy balanced-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2014-6356; reference:url,technet.microsoft.com/en-us/security/bulletin/MS14-081; classtype:attempted-user; sid:32711; rev:1;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office RTF object use after free attempt"; flow:to_server,established; flowbits:isset,file.rtf; file_data; content:"{{{{}{}}{{}{}}{{}{}}"; fast_pattern:only; content:"{|5C|shp{{|7C|sps}"; metadata:policy security-ips drop, service smtp; reference:cve,2014-6357; reference:url,technet.microsoft.com/en-us/security/bulletin/MS14-081; classtype:attempted-user; sid:32708; rev:1;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office RTF object use after free attempt"; flow:to_client,established; flowbits:isset,file.rtf; file_data; content:"{{{{}{}}{{}{}}{{}{}}"; fast_pattern:only; content:"{|5C|shp{{|7C|sps}"; metadata:policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2014-6357; reference:url,technet.microsoft.com/en-us/security/bulletin/MS14-081; classtype:attempted-user; sid:32707; rev:1;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office use after free"; flow:to_server,established; file_data; content:"|FF FF FF 00 00 00 00 00 01 00 00 00 C0 80 C0 00|"; fast_pattern:only; content:"|00 02 00 00 56 65 72 64 61 6E 61 00 00 00 00 40|"; metadata:policy security-ips drop, service smtp; reference:cve,2014-6364; reference:url,technet.microsoft.com/en-us/security/bulletin/ms14-082; classtype:attempted-user; sid:32688; rev:1;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office use after free"; flow:to_client,established; file_data; content:"|FF FF FF 00 00 00 00 00 01 00 00 00 C0 80 C0 00|"; fast_pattern:only; content:"|00 02 00 00 56 65 72 64 61 6E 61 00 00 00 00 40|"; metadata:policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2014-6364; reference:url,technet.microsoft.com/en-us/security/bulletin/ms14-082; classtype:attempted-user; sid:32687; rev:1;) alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel blip image use after free attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|02 00 00 00 3B 00 00 00 03 00 00 00 85 00 00 00 3F 00 01 F0 19 3C 00 00 02 00 07 E0 24 00 00 00|"; fast_pattern:only; metadata:policy balanced-ips drop, policy security-ips drop, service smtp; reference:cve,2014-6360; reference:url,technet.microsoft.com/en-us/security/bulletin/MS14-083; classtype:attempted-user; sid:32684; rev:1;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel blip image use after free attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|02 00 00 00 3B 00 00 00 03 00 00 00 85 00 00 00 3F 00 01 F0 19 3C 00 00 02 00 07 E0 24 00 00 00|"; fast_pattern:only; metadata:policy balanced-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2014-6360; reference:url,technet.microsoft.com/en-us/security/bulletin/MS14-083; classtype:attempted-user; sid:32683; rev:1;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel ObjBiff exploit attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|5D 00|"; content:"|00 14|"; within:8; content:"|00 01 06 00 00|"; within:55; byte_test:1,!=,0x02,0,relative,little; metadata:service smtp; reference:cve,2011-1272; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-045; classtype:attempted-user; sid:32872; rev:3;) alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt"; flow:to_server,established; flowbits:isset,file.rtf; file_data; content:"21433412"; content:"4E087DEB"; distance:0; nocase; content:"F626A"; distance:0; nocase; byte_test:8,>,0x08000000,8,relative,string,hex; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service smtp; reference:cve,2012-0158; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-027; classtype:attempted-user; sid:32863; rev:4;) alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt"; flow:to_server,established; flowbits:isset,file.doc; file_data; content:"|21 43 34 12|"; content:"|B1 3C C1 6A|"; distance:0; content:"|43 6F 62 6A|"; distance:0; byte_test:4,>,8,4,relative,little; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service smtp; reference:cve,2012-0158; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-027; classtype:attempted-user; sid:32862; rev:2;) alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt"; flow:to_server,established; flowbits:isset,file.doc; file_data; content:"|21 43 34 12|"; content:"|A3 E8 13 07|"; distance:0; content:"|43 6F 62 6A|"; distance:0; byte_test:4,>,8,4,relative,little; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service smtp; reference:cve,2012-0158; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-027; classtype:attempted-user; sid:32861; rev:2;) alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt"; flow:to_server,established; flowbits:isset,file.doc; file_data; content:"|21 43 34 12|"; content:"|8B 8D DA 58|"; distance:0; content:"|43 6F 62 6A|"; distance:0; byte_test:4,>,8,4,relative,little; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service smtp; reference:cve,2012-0158; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-027; classtype:attempted-user; sid:32860; rev:2;) alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt"; flow:to_server,established; flowbits:isset,file.doc; file_data; content:"|21 43 34 12|"; content:"|4E 08 7D EB|"; distance:0; content:"|43 6F 62 6A|"; distance:0; byte_test:4,>,8,4,relative,little; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service smtp; reference:cve,2012-0158; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-027; classtype:attempted-user; sid:32859; rev:2;) alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt"; flow:to_server,established; flowbits:isset,file.doc; file_data; content:"|21 43 34 12|"; content:"|00 36 D8 F4|"; distance:0; content:"|43 6F 62 6A|"; distance:0; byte_test:4,>,8,4,relative,little; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service smtp; reference:cve,2012-0158; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-027; classtype:attempted-user; sid:32858; rev:2;) alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt"; flow:to_server,established; flowbits:isset,file.doc; file_data; content:"|21 43 34 12|"; content:"|8E 7E E1 E6|"; distance:0; content:"|43 6F 62 6A|"; distance:0; byte_test:4,>,8,4,relative,little; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service smtp; reference:cve,2012-0158; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-027; classtype:attempted-user; sid:32857; rev:2;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Publisher 2003 EscherStm memory corruption attempt"; flow:to_server,established; flowbits:isset,file.pub; file_data; content:"|00 0B 00 0B 00 00 00 00 00 00 00 AA 00 00 00 03 A0 41 41 41 FF|"; fast_pattern:only; metadata:service smtp; reference:bugtraq,50949; reference:cve,2011-3411; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-091; classtype:attempted-user; sid:32961; rev:3;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Publisher 2003 EscherStm memory corruption attempt"; flow:to_server,established; flowbits:isset,file.pub; file_data; content:"|03 80 79 6A D5 FF 04 20 F5 01 2A 00 3A 01 11 F0 0A 00 00 00 0A 00 00 00 01 68 42 01|"; fast_pattern:only; metadata:service smtp; reference:bugtraq,50949; reference:cve,2011-3411; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-091; classtype:attempted-user; sid:32960; rev:2;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel SLK file excessive Picture records exploit attempt"; flow:to_server,established; flowbits:isset,file.slk; file_data; content:"|0A|P|3B|PAAAA"; content:"|0A|P|3B|PAAAA"; distance:0; content:"|0A|P|3B|PAAAA"; distance:0; content:"|0A|P|3B|PAAAA"; distance:0; content:"|0A|P|3B|PAAAA"; distance:0; content:"|0A|P|3B|PAAAA"; distance:0; metadata:service smtp; reference:cve,2011-1276; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-045; classtype:attempted-user; sid:32942; rev:2;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel SLK file excessive Picture records exploit attempt"; flow:to_server,established; flowbits:isset,file.slk; file_data; content:"|0D 0A|P|3B|FABC"; content:"|0D 0A|P|3B|FABC"; distance:0; content:"|0D 0A|P|3B|FABC"; distance:0; content:"|0D 0A|P|3B|FABC"; distance:0; content:"|0D 0A|P|3B|FABC"; distance:0; content:"|0D 0A|P|3B|FABC"; distance:0; pcre:"/(\x0d\x0aP\x3bFABC\d{3}){200}/i"; metadata:service smtp; reference:cve,2011-1276; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-045; classtype:attempted-user; sid:32941; rev:2;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel malformed Label record exploit attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|09 08 08 00 00 05 05 00|"; content:"|04 02|"; distance:0; byte_test:1,&,0x80,9,relative; byte_test:2,>,8,0,relative,little; byte_test:2,<,8225,0,relative,little; metadata:service smtp; reference:cve,2004-0846; reference:cve,2011-0098; reference:url,technet.microsoft.com/en-us/security/bulletin/MS04-033; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-021; classtype:attempted-user; sid:32940; rev:2;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel remote exploit attempt"; flow:to_client,established; file_data; content:"|C8 19 F5 05 27 D4 FD 77 3F 66 9A 71 A3 3B 09 B2 79 03 3E A0 A4 FA 9F AE E7 EC D3 51 3C 5F E5 FC|"; fast_pattern:only; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2015-0063; reference:url,technet.microsoft.com/en-us/security/bulletin/ms15-012; classtype:attempted-user; sid:33362; rev:2;) alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Word wwlib use after free attempt"; flow:established,to_server; flowbits:isset,file.doc; content:"|00 00 30 22 00 00 00 00 00 00 DC 23 00 00 00 00 00 00 DC 23 00 00 00 00 00 00 55 31 00 00 00 00|"; fast_pattern:only; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service smtp; reference:cve,2015-0064; reference:url,technet.microsoft.com/en-us/security/bulletin/MS15-012; classtype:attempted-user; sid:33351; rev:2;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word wwlib use after free attempt"; flow:established,to_client; flowbits:isset,file.doc; content:"|00 00 30 22 00 00 00 00 00 00 DC 23 00 00 00 00 00 00 DC 23 00 00 00 00 00 00 55 31 00 00 00 00|"; fast_pattern:only; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2015-0064; reference:url,technet.microsoft.com/en-us/security/bulletin/MS15-012; classtype:attempted-user; sid:33350; rev:2;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office OLESS stream object name corruption attempt"; flow:to_server,established; flowbits:isset,file.ole; file_data; content:"|44 00 72 00 61 00 77 00 69 00 6E 00 67 00 78 00 00 00 35 40 4C 00 00 00 B4 51 00 00 00 00 00 00 00 00 00 00 45 00 00 00 61 00 00 00 00 00 00 00|"; fast_pattern:only; metadata:service smtp; reference:bugtraq,50977; reference:cve,2011-3400; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-093; reference:url,www.securityfocus.com/bid/50977; classtype:attempted-user; sid:33442; rev:3;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office OLESS stream object name corruption attempt"; flow:to_client,established; flowbits:isset,file.ole; file_data; content:"|44 00 72 00 61 00 77 00 69 00 6E 00 67 00 78 00 00 00 35 40 4C 00 00 00 B4 51 00 00 00 00 00 00 00 00 00 00 45 00 00 00 61 00 00 00 00 00 00 00|"; fast_pattern:only; metadata:service ftp-data, service http, service imap, service pop3; reference:bugtraq,50977; reference:cve,2011-3400; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-093; reference:url,www.securityfocus.com/bid/50977; classtype:attempted-user; sid:33441; rev:3;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Word document with embedded networking script"; flow:to_server,established; flowbits:isset,file.doc; file_data; content:"objXMLHTTP"; fast_pattern:only; content:"objADOStream"; metadata:service smtp; reference:url,www.virustotal.com/en/file/e031685f71240913721b278b1253d09101faab9953e713ff840b31e5fdc387da/analysis/; classtype:policy-violation; sid:33563; rev:2;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word document with embedded networking script"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"objXMLHTTP"; fast_pattern:only; content:"objADOStream"; metadata:service ftp-data, service http, service imap, service pop3; reference:url,www.virustotal.com/en/file/e031685f71240913721b278b1253d09101faab9953e713ff840b31e5fdc387da/analysis/; classtype:policy-violation; sid:33562; rev:3;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Word border use-after-free attempt"; flow:to_server,established; flowbits:isset,file.docx; file_data; content:"|1D 3D B1 8C 1C 0A 73 ED D9 F4 8E 2C C8 46 55 8B AA 97 1D 55 18 77 24 45 E2 49 1C E1 2A 49 BF 25 5E|"; fast_pattern:only; metadata:policy max-detect-ips drop, service smtp; reference:cve,2011-1983; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-099; classtype:attempted-user; sid:33568; rev:2;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word border use-after-free attempt"; flow:to_client,established; flowbits:isset,file.docx; file_data; content:"|1D 3D B1 8C 1C 0A 73 ED D9 F4 8E 2C C8 46 55 8B AA 97 1D 55 18 77 24 45 E2 49 1C E1 2A 49 BF 25 5E|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2011-1983; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-099; classtype:attempted-user; sid:33567; rev:2;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office ADODB.RecordSet code execution attempt"; flow:to_server,established; flowbits:isset,file.ole; file_data; content:"CreateObject(|22|ADODB.Recordset|22|)"; fast_pattern:only; content:"document.location.href"; nocase; metadata:service smtp; reference:cve,2015-0097; reference:url,technet.microsoft.com/en-us/security/bulletin/ms15-022; classtype:attempted-user; sid:33735; rev:1;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office ADODB.RecordSet code execution attempt"; flow:to_client,established; flowbits:isset,file.ole; file_data; content:"CreateObject(|22|ADODB.Recordset|22|)"; fast_pattern:only; content:"document.location.href"; nocase; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2015-0097; reference:url,technet.microsoft.com/en-us/security/bulletin/ms15-022; classtype:attempted-user; sid:33734; rev:1;) alert tcp $EXTERNAL_NET any -> $HOME_NET 25 (msg:"FILE-OFFICE Microsoft Office Word incorrect schema property remote code execution attempt"; flow:established,to_server; flowbits:isset,file.docx; file_data; content:"|4D 60 52 3B 55 B9 2A 33 49 ED 5B 4A 48 32 68 C7 B6 1C 49 1E E0 DF A7 E5 0B 5F 80 0D D9 4D 1E 52|"; fast_pattern:only; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service smtp; reference:cve,2015-0085; reference:url,technet.microsoft.com/en-us/security/bulletin/ms15-022; classtype:attempted-user; sid:33716; rev:2;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word incorrect schema property remote code execution attempt"; flow:established,to_client; flowbits:isset,file.docx; file_data; content:"|4D 60 52 3B 55 B9 2A 33 49 ED 5B 4A 48 32 68 C7 B6 1C 49 1E E0 DF A7 E5 0B 5F 80 0D D9 4D 1E 52|"; fast_pattern:only; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2015-0085; reference:url,technet.microsoft.com/en-us/security/bulletin/ms15-022; classtype:attempted-user; sid:33715; rev:2;) alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office RTF out-of-bounds array access remote code execution attempt"; flow:to_server,established; flowbits:isset,file.rtf; file_data; content:"{|5C|sv }"; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service smtp; reference:cve,2015-1649; reference:url,technet.microsoft.com/en-us/security/bulletin/ms15-033; classtype:attempted-user; sid:34094; rev:2;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office RTF out-of-bounds array access remote code execution attempt"; flow:to_client,established; flowbits:isset,file.rtf; file_data; content:"{|5C|sv }"; fast_pattern:only; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2015-1649; reference:url,technet.microsoft.com/en-us/security/bulletin/ms15-033; classtype:attempted-user; sid:34093; rev:2;) alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office RTF double-free remote code execution attempt"; flow:to_server,established; file_data; content:"hp}|5C|xmlns1{|5C|protend{|5C|xmlclose}|5C|xmlns2{|5C|"; fast_pattern:only; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service smtp; reference:cve,2015-1651; reference:url,technet.microsoft.com/en-us/security/bulletin/ms15-033; classtype:attempted-user; sid:34087; rev:2;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office RTF double-free remote code execution attempt"; flow:to_client,established; file_data; content:"hp}|5C|xmlns1{|5C|protend{|5C|xmlclose}|5C|xmlns2{|5C|"; fast_pattern:only; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2015-1651; reference:url,technet.microsoft.com/en-us/security/bulletin/ms15-033; classtype:attempted-user; sid:34086; rev:2;) alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office XML nested num tag double-free attempt"; flow:to_server,established; file_data; content:"|00 12 00 00 00|word/numbering.xml"; fast_pattern; content:"|52 3A 31 5A 44 FE 0F 44 CF 3D E1 8D E4 10 B5 C7 29 21 EC 9E B9 8D 84 21 C2 6B 18 33 69 76 C5 9D|"; within:32; distance:279; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service smtp; reference:bugtraq,74011; reference:cve,2015-1650; reference:url,technet.microsoft.com/en-us/security/bulletin/ms15-033; classtype:attempted-user; sid:34067; rev:3;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office XML nested num tag double-free attempt"; flow:to_client,established; file_data; content:"|00 12 00 00 00|word/numbering.xml"; fast_pattern; content:"|52 3A 31 5A 44 FE 0F 44 CF 3D E1 8D E4 10 B5 C7 29 21 EC 9E B9 8D 84 21 C2 6B 18 33 69 76 C5 9D|"; within:32; distance:279; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,74011; reference:cve,2015-1650; reference:url,technet.microsoft.com/en-us/security/bulletin/ms15-033; classtype:attempted-user; sid:34066; rev:3;) alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Word document memory corruption attempt"; flow:to_server,established; flowbits:isset,file.docx; file_data; content:"|BC AF 87 AD CB 62 47 80 14 8E 41 66 48 81 DE 9E 6B E5 40 8B A0 47 F5 5B ED 9E 23 D5 01 3B D1 58|"; fast_pattern:only; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service smtp; reference:cve,2015-1641; reference:url,technet.microsoft.com/en-us/security/bulletin/ms15-033; classtype:attempted-user; sid:34063; rev:3;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word document memory corruption attempt"; flow:to_client,established; flowbits:isset,file.docx; file_data; content:"|BC AF 87 AD CB 62 47 80 14 8E 41 66 48 81 DE 9E 6B E5 40 8B A0 47 F5 5B ED 9E 23 D5 01 3B D1 58|"; fast_pattern:only; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2015-1641; reference:url,technet.microsoft.com/en-us/security/bulletin/ms15-033; classtype:attempted-user; sid:34062; rev:3;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE RTF file with embedded OLE object"; flow:to_server,established; flowbits:isset,file.rtf; file_data; content:"d0cf11e"; fast_pattern:only; metadata:service smtp; reference:url,www.adobe.com/devnet/acrobat/javascript.html; classtype:policy-violation; sid:34131; rev:1;) alert tcp $EXTERNAL_NET any -> $HOME_NET 25 (msg:"FILE-OFFICE Microsoft Office Word incorrect ptCount element denial of service attempt"; flow:established,to_server; flowbits:isset,file.docx; file_data; content:"|5C D3 6E 39 8C EE 34 F1 05 33 3C 1D 97 CA D1 FB D5 D5 D5 DB DB DB D1 BF 04 22 03 03 7B B3 A2 2C|"; fast_pattern:only; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service smtp; reference:cve,2015-1682; reference:url,technet.microsoft.com/en-us/security/bulletin/ms15-046; classtype:denial-of-service; sid:34429; rev:3;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word incorrect ptCount element denial of service attempt"; flow:established,to_client; flowbits:isset,file.docx; file_data; content:"|5C D3 6E 39 8C EE 34 F1 05 33 3C 1D 97 CA D1 FB D5 D5 D5 DB DB DB D1 BF 04 22 03 03 7B B3 A2 2C|"; fast_pattern:only; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2015-1682; reference:url,technet.microsoft.com/en-us/security/bulletin/ms15-046; classtype:denial-of-service; sid:34428; rev:3;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Word SmartTag record code execution attempt"; flow:to_server,established; flowbits:isset,file.doc; file_data; content:"|00 00 13 1F 14 FF 95 80 FF FF 01 00 00 00 00 00 28 2C 2D 00 00 00 01 00 D4 F5 22 00 00 00 00 00 44 00 00 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,30124; reference:cve,2008-2244; classtype:attempted-user; sid:31312; rev:6;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Word SmartTag record code execution attempt"; flow:to_server,established; flowbits:isset,file.doc; file_data; content:"|00 FF FF 01 00 00 00 05 00 4C 4F 0C 00 00 00 01 00 00 00 00 00 00 00 00 00 16 00 00 00 00 00 00 00 01 00 0E 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,30124; reference:cve,2008-2244; classtype:attempted-user; sid:31311; rev:6;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word SmartTag record code execution attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|00 00 13 1F 14 FF 95 80 FF FF 01 00 00 00 00 00 28 2C 2D 00 00 00 01 00 D4 F5 22 00 00 00 00 00 44 00 00 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,30124; reference:cve,2008-2244; classtype:attempted-user; sid:31310; rev:6;) alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office GDI library TIFF handling integer overflow attempt"; flow:to_server,established; file_data; content:"|9D 58 67 58 53 57 18 4E 08 84 3D 02 04 08 7B 4A 08 60 D9 1B 94 15 F6 DE B3|"; fast_pattern:only; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service smtp; reference:bugtraq,63530; reference:cve,2013-3906; reference:url,technet.microsoft.com/en-us/security/advisory/2896666; reference:url,technet.microsoft.com/en-us/security/bulletin/MS13-096; classtype:attempted-user; sid:28526; rev:8;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office GDI library TIFF handling integer overflow attempt"; flow:to_client,established; file_data; content:"|9D 58 67 58 53 57 18 4E 08 84 3D 02 04 08 7B 4A 08 60 D9 1B 94 15 F6 DE B3|"; fast_pattern:only; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,63530; reference:cve,2013-3906; reference:url,technet.microsoft.com/en-us/security/advisory/2896666; reference:url,technet.microsoft.com/en-us/security/bulletin/MS13-096; classtype:attempted-user; sid:28525; rev:8;) alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office GDI library TIFF handling integer overflow attempt"; flow:to_server,established; file_data; content:"|EC 5A 07 54 D3 D9 B3 BE F4 2E EA 4A 17 75 57 8A C2 02 8A 0A 04 50 B1 81 34|"; fast_pattern:only; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service smtp; reference:bugtraq,63530; reference:cve,2013-3906; reference:url,technet.microsoft.com/en-us/security/advisory/2896666; reference:url,technet.microsoft.com/en-us/security/bulletin/MS13-096; classtype:attempted-user; sid:28473; rev:8;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office GDI library TIFF handling integer overflow attempt"; flow:to_client,established; file_data; content:"|EC 5A 07 54 D3 D9 B3 BE F4 2E EA 4A 17 75 57 8A C2 02 8A 0A 04 50 B1 81 34|"; fast_pattern:only; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,63530; reference:cve,2013-3906; reference:url,technet.microsoft.com/en-us/security/advisory/2896666; reference:url,technet.microsoft.com/en-us/security/bulletin/MS13-096; classtype:attempted-user; sid:28472; rev:8;) alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office GDI library TIFF handling integer overflow attempt"; flow:to_server,established; flowbits:isset,file.tiff.little; file_data; content:"|17 01 04 00 01 00 00 00|"; byte_test:4,>,0xFFFFFF,0,relative,little; content:"|02 02 04 00 01 00 00 00|"; within:300; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service smtp; reference:bugtraq,63530; reference:cve,2013-3906; reference:url,technet.microsoft.com/en-us/security/advisory/2896666; reference:url,technet.microsoft.com/en-us/security/bulletin/MS13-096; classtype:attempted-user; sid:28471; rev:9;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office GDI library TIFF handling integer overflow attempt"; flow:to_client,established; flowbits:isset,file.tiff.little; file_data; content:"|17 01 04 00 01 00 00 00|"; byte_test:4,>,0xFFFFFF,0,relative,little; content:"|02 02 04 00 01 00 00 00|"; within:300; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,63530; reference:cve,2013-3906; reference:url,technet.microsoft.com/en-us/security/advisory/2896666; reference:url,technet.microsoft.com/en-us/security/bulletin/MS13-096; classtype:attempted-user; sid:28470; rev:9;) alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office GDI library TIFF handling integer overflow attempt"; flow:to_server,established; flowbits:isset,file.tiff.big; file_data; content:"|01 17 00 04 00 00 00 01|"; byte_test:4,>,0xFFFFFF,0,relative; content:"|02 02 00 04 00 00 00 01|"; within:300; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service smtp; reference:bugtraq,63530; reference:cve,2013-3906; reference:url,technet.microsoft.com/en-us/security/advisory/2896666; reference:url,technet.microsoft.com/en-us/security/bulletin/MS13-096; classtype:attempted-user; sid:28469; rev:9;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office GDI library TIFF handling integer overflow attempt"; flow:to_client,established; flowbits:isset,file.tiff.big; file_data; content:"|01 17 00 04 00 00 00 01|"; byte_test:4,>,0xFFFFFF,0,relative; content:"|02 02 00 04 00 00 00 01|"; within:300; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,63530; reference:cve,2013-3906; reference:url,technet.microsoft.com/en-us/security/advisory/2896666; reference:url,technet.microsoft.com/en-us/security/bulletin/MS13-096; classtype:attempted-user; sid:28468; rev:9;) alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office GDI library TIFF handling integer overflow attempt"; flow:to_server,established; content:"|ED 5C 07 54 53 59 B7 3E A1 57 11 95 D0 44 9D 91 A2 32 80 22 02 41 B0 22 48|"; fast_pattern:only; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service smtp; reference:bugtraq,63530; reference:cve,2013-3906; reference:url,technet.microsoft.com/en-us/security/advisory/2896666; reference:url,technet.microsoft.com/en-us/security/bulletin/MS13-096; classtype:attempted-user; sid:28467; rev:9;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office GDI library TIFF handling integer overflow attempt"; flow:to_client,established; file_data; content:"|ED 5C 07 54 53 59 B7 3E A1 57 11 95 D0 44 9D 91 A2 32 80 22 02 41 B0 22 48|"; fast_pattern:only; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,63530; reference:cve,2013-3906; reference:url,technet.microsoft.com/en-us/security/advisory/2896666; reference:url,technet.microsoft.com/en-us/security/bulletin/MS13-096; classtype:attempted-user; sid:28466; rev:9;) alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office GDI library TIFF handling integer overflow attempt"; flow:to_server,established; flowbits:isset,file.tiff|file.doc; file_data; content:"|98 B8 FF FF B2 00 00 00 B2 00 00 00 B3 00 00 00 B3 00 00 00 B2 00 00 00 B1 00 00 00|"; fast_pattern:only; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service smtp; reference:bugtraq,63530; reference:cve,2013-3906; reference:url,technet.microsoft.com/en-us/security/advisory/2896666; reference:url,technet.microsoft.com/en-us/security/bulletin/MS13-096; classtype:attempted-user; sid:28465; rev:9;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office GDI library TIFF handling integer overflow attempt"; flow:to_client,established; flowbits:isset,file.tiff|file.doc; file_data; content:"|98 B8 FF FF B2 00 00 00 B2 00 00 00 B3 00 00 00 B3 00 00 00 B2 00 00 00 B1 00 00 00|"; fast_pattern:only; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,63530; reference:cve,2013-3906; reference:url,technet.microsoft.com/en-us/security/advisory/2896666; reference:url,technet.microsoft.com/en-us/security/bulletin/MS13-096; classtype:attempted-user; sid:28464; rev:9;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office dpnet.dll DirectPlay CFixedPool-Get clsid access"; flow:to_client,established; flowbits:isset,file.ole; file_data; content:"|C6 1D 3F 74 BA 5A 9F 42 8B DF C5 4D 03 25 3D C2|"; fast_pattern:only; metadata:policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,56839; reference:cve,2012-1537; reference:url,technet.microsoft.com/en-us/security/bulletin/ms12-082; classtype:attempted-dos; sid:28343; rev:6;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office dpnet.dll DirectPlay CFixedPool-Get clsid access"; flow:to_client,established; flowbits:isset,file.ole; file_data; content:"|AD 55 79 66 3B 6B CA 43 B9 49 BC 69 B5 BA FF 7F|"; fast_pattern:only; metadata:policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,56839; reference:cve,2012-1537; reference:url,technet.microsoft.com/en-us/security/bulletin/ms12-082; classtype:attempted-dos; sid:28342; rev:6;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office dpnet.dll DirectPlay CFixedPool-Get clsid access"; flow:to_client,established; flowbits:isset,file.ole; file_data; content:"|A2 D9 C1 E4 F7 CB BD 48 9A 69 34 A5 5E 0D 89 41|"; fast_pattern:only; metadata:policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,56839; reference:cve,2012-1537; reference:url,technet.microsoft.com/en-us/security/bulletin/ms12-082; classtype:attempted-dos; sid:28341; rev:6;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office dpnet.dll DirectPlay CFixedPool-Get clsid access"; flow:to_client,established; flowbits:isset,file.ole; file_data; content:"|A0 7B FE EB 8D 62 D2 11 AE 0F 00 60 97 B0 14 11|"; fast_pattern:only; metadata:policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,56839; reference:cve,2012-1537; reference:url,technet.microsoft.com/en-us/security/bulletin/ms12-082; classtype:attempted-dos; sid:28340; rev:6;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office dpnet.dll DirectPlay CFixedPool-Get clsid access"; flow:to_client,established; flowbits:isset,file.ole; file_data; content:"|90 42 93 53 8D 62 D2 11 AE 0F 00 60 97 B0 14 11|"; fast_pattern:only; metadata:policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,56839; reference:cve,2012-1537; reference:url,technet.microsoft.com/en-us/security/bulletin/ms12-082; classtype:attempted-dos; sid:28339; rev:6;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office dpnet.dll DirectPlay CFixedPool-Get clsid access"; flow:to_client,established; flowbits:isset,file.ole; file_data; content:"|75 67 2B 3B B6 70 AF 45 8D EA A2 09 C6 95 59 F3|"; fast_pattern:only; metadata:policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,56839; reference:cve,2012-1537; reference:url,technet.microsoft.com/en-us/security/bulletin/ms12-082; classtype:attempted-dos; sid:28338; rev:6;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office dpnet.dll DirectPlay CFixedPool-Get clsid access"; flow:to_client,established; flowbits:isset,file.ole; file_data; content:"|60 5D 3B 74 8D 62 D2 11 AE 0F 00 60 97 B0 14 11|"; fast_pattern:only; metadata:policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,56839; reference:cve,2012-1537; reference:url,technet.microsoft.com/en-us/security/bulletin/ms12-082; classtype:attempted-dos; sid:28337; rev:6;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office dpnet.dll DirectPlay CFixedPool-Get clsid access"; flow:to_client,established; flowbits:isset,file.ole; file_data; content:"|50 36 4A 6D 8D 62 D2 11 AE 0F 00 60 97 B0 14 11|"; fast_pattern:only; metadata:policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,56839; reference:cve,2012-1537; reference:url,technet.microsoft.com/en-us/security/bulletin/ms12-082; classtype:attempted-dos; sid:28336; rev:6;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office dpnet.dll DirectPlay CFixedPool-Get clsid access"; flow:to_client,established; flowbits:isset,file.ole; file_data; content:"|4D 48 6F 28 5E 37 58 44 A2 72 B1 38 E2 F8 0A 6A|"; fast_pattern:only; metadata:policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,56839; reference:cve,2012-1537; reference:url,technet.microsoft.com/en-us/security/bulletin/ms12-082; classtype:attempted-dos; sid:28335; rev:6;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office dpnet.dll DirectPlay CFixedPool-Get clsid access"; flow:to_client,established; flowbits:isset,file.ole; file_data; content:"|2C AF 75 F9 51 9A F0 4A 91 EA 06 03 86 98 CE 38|"; fast_pattern:only; metadata:policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,56839; reference:cve,2012-1537; reference:url,technet.microsoft.com/en-us/security/bulletin/ms12-082; classtype:attempted-dos; sid:28334; rev:6;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office dpnet.dll DirectPlay CFixedPool-Get clsid access"; flow:to_client,established; flowbits:isset,file.ole; file_data; content:"|23 95 4A 93 CA A3 C5 4B AD A0 D6 D9 5D 97 94 21|"; fast_pattern:only; metadata:policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,56839; reference:cve,2012-1537; reference:url,technet.microsoft.com/en-us/security/bulletin/ms12-082; classtype:attempted-dos; sid:28333; rev:6;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office dpnet.dll DirectPlay CFixedPool-Get clsid access"; flow:to_client,established; flowbits:isset,file.ole; file_data; content:"|1B 5E 82 DA 30 68 D7 43 83 5D 0B 5A D8 29 56 A2|"; fast_pattern:only; metadata:policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,56839; reference:cve,2012-1537; reference:url,technet.microsoft.com/en-us/security/bulletin/ms12-082; classtype:attempted-dos; sid:28332; rev:6;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office dpnet.dll DirectPlay CFixedPool-Get clsid access"; flow:to_client,established; flowbits:isset,file.ole; file_data; content:"|0E 06 47 FC 53 61 34 4B B9 75 8E 41 21 EB 7F 3C|"; fast_pattern:only; metadata:policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,56839; reference:cve,2012-1537; reference:url,technet.microsoft.com/en-us/security/bulletin/ms12-082; classtype:attempted-dos; sid:28331; rev:6;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel FtCbls remote code execution attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|00 5D|"; byte_extract:2,0,recSize,relative,little; content:"|00 15 00 12|"; within:4; content:"|00 0A 00 0C|"; within:recSize; fast_pattern; content:!"|00 00 00 00|"; within:4; distance:2; metadata:policy max-detect-ips drop, service smtp; reference:cve,2009-0557; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-021; classtype:attempted-admin; sid:28136; rev:5;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel FtCbls remote code execution attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|00 5D|"; byte_extract:2,0,recSize,relative,little; content:"|00 15 00 12|"; within:4; content:"|00 0A 00 0C|"; within:recSize; fast_pattern; content:!"|00 00 00 00|"; within:4; distance:2; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2009-0557; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-021; classtype:attempted-admin; sid:28135; rev:5;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel style handling overflow attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|C0 20 93 02|"; byte_test:2,>,40,0,relative,little; byte_test:2,>,733,4,relative,little; byte_test:1,!&,0x80,3,relative,little; content:"|00|"; within:1; distance:6; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,18872; reference:cve,2006-3431; reference:url,technet.microsoft.com/en-us/security/bulletin/ms06-059; classtype:attempted-user; sid:27211; rev:7;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Visio TAG_xxxSect code execution attempt"; flow:established,to_client; file_data; content:"|02 00 F1 00 32 00 01 00 01 54 00 00 14 00 00 00 00 00 00 00 06 00 48 00 00 00 00 00 83 00 04 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-0019; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-015; classtype:attempted-user; sid:26973; rev:8;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel invalid Window2 BIFF record value attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|65 20 75 73 65 72 10 3E 02 12 00 B6 04 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 1D 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, policy security-ips drop, service smtp; reference:bugtraq,53374; reference:cve,2012-0143; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-030; classtype:attempted-user; sid:25367; rev:11;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel invalid Window2 BIFF record value attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|65 20 75 73 65 72 10 3E 02 12 00 B6 04 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 1D 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,53374; reference:cve,2012-0143; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-030; classtype:attempted-user; sid:25366; rev:11;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office PowerPoint invalid OfficeArtSpContainer subrecord type confusion attempt"; flow:to_server,established; flowbits:isset,file.ppt; file_data; content:"|0F 00 04 F0|"; byte_extract:4,0,reclen,relative,little; content:"|00 00 1F F0 08 00 00 00|"; within:reclen; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,50964; reference:cve,2011-3413; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-094; classtype:attempted-user; sid:25355; rev:11;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office PowerPoint invalid OfficeArtSpContainer subrecord type confusion attempt"; flow:to_server,established; flowbits:isset,file.ppt; file_data; content:"|0F 00 04 F0|"; byte_extract:4,0,reclen,relative,little; content:"|00 00 27 F0 08 00 00 00|"; within:reclen; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,50964; reference:cve,2011-3413; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-094; classtype:attempted-user; sid:25354; rev:11;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office PowerPoint invalid OfficeArtSpContainer subrecord type confusion attempt"; flow:to_client,established; flowbits:isset,file.ppt; file_data; content:"|0F 00 04 F0|"; byte_extract:4,0,reclen,relative,little; content:"|00 00 27 F0 08 00 00 00|"; within:reclen; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,50964; reference:cve,2011-3413; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-094; classtype:attempted-user; sid:25353; rev:11;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel conditional code execution attempt"; flow:to_server, established; flowbits:isset, file.xls; file_data; content:"|FF FF FF 7F 01 00 02 0A 00 0A 00 00 00 09 08 10 00 00 06 10|"; fast_pattern:only; metadata:policy max-detect-ips drop, service smtp; reference:cve,2011-1989; classtype:attempted-user; sid:25331; rev:9;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel conditional code execution attempt"; flow:to_client, established; flowbits:isset, file.xls; file_data; content:"|FF FF FF 7F 01 00 02 0A 00 0A 00 00 00 09 08 10 00 00 06 10|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2011-1989; classtype:attempted-user; sid:25330; rev:9;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel IPMT record buffer overflow attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|1C 1D 13 08 48 00 13 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 25 02 00 00 00 11 6D 79 63 6F|"; fast_pattern:only; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2011-0101; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-021; classtype:attempted-user; sid:25293; rev:6;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Word rtf invalid listoverridecount value attempt"; flow:to_server,established; flowbits:isset,file.rtf; file_data; content:"|5C|listoverride"; content:"|5C|listoverridecount"; fast_pattern:only; pcre:"/listoverridecount([2345678]|[019][0-9])/i"; metadata:policy max-detect-ips drop, service smtp; reference:cve,2012-2539; reference:cve,2014-1761; reference:url,technet.microsoft.com/en-us/security/advisory/2953095; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-079; reference:url,technet.microsoft.com/en-us/security/bulletin/MS14-018; classtype:attempted-user; sid:24975; rev:12;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word rtf invalid listoverridecount value attempt"; flow:to_client,established; flowbits:isset,file.rtf; file_data; content:"|5C|listoverride"; content:"|5C|listoverridecount"; fast_pattern:only; pcre:"/listoverridecount([2345678]|[019][0-9])/i"; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-2539; reference:cve,2014-1761; reference:url,technet.microsoft.com/en-us/security/advisory/2953095; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-079; reference:url,technet.microsoft.com/en-us/security/bulletin/MS14-018; classtype:attempted-user; sid:24974; rev:12;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office dpnet.dll DirectPlay CFixedPool-Get clsid access"; flow:to_client,established; flowbits:isset,file.ole; file_data; content:"|23 95 4A 93 CA A3 C5 4B A0 AD 21 94 97 5D D9 D6|"; fast_pattern:only; metadata:policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,56839; reference:cve,2012-1537; reference:url,technet.microsoft.com/en-us/security/bulletin/ms12-082; classtype:attempted-dos; sid:24970; rev:10;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office dpnet.dll DirectPlay CFixedPool-Get clsid access"; flow:to_client,established; flowbits:isset,file.ole; file_data; content:"|C6 1D 3F 74 BA 5A 9F 42 DF 8B C2 3D 25 03 4D C5|"; fast_pattern:only; metadata:policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-1537; reference:url,technet.microsoft.com/en-us/security/bulletin/ms12-082; classtype:attempted-dos; sid:24969; rev:9;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office dpnet.dll DirectPlay CFixedPool-Get clsid access"; flow:to_client,established; flowbits:isset,file.ole; file_data; content:"|60 5D 3B 74 8D 62 D2 11 0F AE 11 14 B0 97 60 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-1537; reference:url,technet.microsoft.com/en-us/security/bulletin/ms12-082; classtype:attempted-dos; sid:24968; rev:9;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office dpnet.dll DirectPlay CFixedPool-Get clsid access"; flow:to_client,established; flowbits:isset,file.ole; file_data; content:"|50 36 4A 6D 8D 62 D2 11 0F AE 11 14 B0 97 60 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-1537; reference:url,technet.microsoft.com/en-us/security/bulletin/ms12-082; classtype:attempted-dos; sid:24967; rev:9;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office dpnet.dll DirectPlay CFixedPool-Get clsid access"; flow:to_client,established; flowbits:isset,file.ole; file_data; content:"|AD 55 79 66 3B 6B CA 43 49 B9 7F FF BA B5 69 BC|"; fast_pattern:only; metadata:policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-1537; reference:url,technet.microsoft.com/en-us/security/bulletin/ms12-082; classtype:attempted-dos; sid:24966; rev:9;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office dpnet.dll DirectPlay CFixedPool-Get clsid access"; flow:to_client,established; flowbits:isset,file.ole; file_data; content:"|4D 48 6F 28 5E 37 58 44 72 A2 6A 0A F8 E2 38 B1|"; fast_pattern:only; metadata:policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-1537; reference:url,technet.microsoft.com/en-us/security/bulletin/ms12-082; classtype:attempted-dos; sid:24965; rev:9;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office dpnet.dll DirectPlay CFixedPool-Get clsid access"; flow:to_client,established; flowbits:isset,file.ole; file_data; content:"|75 67 2B 3B B6 70 AF 45 EA 8D F3 59 95 C6 09 A2|"; fast_pattern:only; metadata:policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-1537; reference:url,technet.microsoft.com/en-us/security/bulletin/ms12-082; classtype:attempted-dos; sid:24964; rev:9;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Works Word document use after free attempt"; flow:to_server,established; flowbits:isset,file.doc; file_data; content:"|00 FF 00 00 00 13 3B 74 FF 13 3B 74 FF 95 C0 95 8C 13 3B 74 FF 95 80 13 3B 74 FF 95 80 0F 00 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, policy security-ips drop, service smtp; reference:cve,2012-2550; classtype:attempted-user; sid:24588; rev:8;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Works Word document use after free attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|00 FF 00 00 00 13 3B 74 FF 13 3B 74 FF 95 C0 95 8C 13 3B 74 FF 95 80 13 3B 74 FF 95 80 0F 00 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-2550; classtype:attempted-user; sid:24587; rev:8;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Word rgfc value overflow attempt"; flow:to_server,established; flowbits:isset,file.doc; file_data; content:"|47 16 00 00 4A 16 00 00 B2 0C 00 40 51 16 00 00 55 16 00 00 59 16 00 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, policy security-ips drop, service smtp; reference:cve,2012-0182; reference:url,technet.microsoft.com/en-us/security/bulletin/ms12-064; classtype:attempted-user; sid:24358; rev:7;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word rgfc value overflow attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|47 16 00 00 4A 16 00 00 B2 0C 00 40 51 16 00 00 55 16 00 00 59 16 00 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-0182; reference:url,technet.microsoft.com/en-us/security/bulletin/ms12-064; classtype:attempted-user; sid:24357; rev:7;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Word RTF malformed listid attempt"; flow:to_server,established; flowbits:isset,file.rtf; file_data; content:"|5C|listid2147483647}"; fast_pattern:only; metadata:policy max-detect-ips drop, policy security-ips drop, service smtp; reference:cve,2012-2528; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-064; classtype:attempted-user; sid:24354; rev:9;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word RTF malformed listid attempt"; flow:to_client,established; flowbits:isset,file.rtf; file_data; content:"|5C|listtable{"; content:"|5C|listid2147483647}"; fast_pattern:only; metadata:policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-2528; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-064; classtype:attempted-user; sid:24353; rev:9;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Works 9 use-after-free attempt"; flow:to_server,established; flowbits:isset,file.doc; file_data; content:" = |22|BLAAAAAH|22| |22|, blah blah |13| IF |13| MERGEFIELD"; fast_pattern:only; metadata:policy max-detect-ips drop, policy security-ips drop, service smtp; reference:cve,2012-2550; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-065; classtype:attempted-user; sid:24352; rev:7;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Works 9 use-after-free attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:" = |22|BLAAAAAH|22| |22|, blah blah |13| IF |13| MERGEFIELD"; fast_pattern:only; metadata:policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-2550; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-065; classtype:attempted-user; sid:24351; rev:7;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Drawing object code execution attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|EC 00|"; byte_extract:2,0,record,relative,little; content:"|0B F0|"; within:record; content:"|80 00|"; within:record; content:!"|00 00 00 00|"; within:4; flowbits:set,recordtype; flowbits:noalert; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,23826; reference:cve,2007-1203; reference:cve,2007-1747; reference:url,technet.microsoft.com/en-us/security/bulletin/ms07-023; classtype:attempted-user; sid:24284; rev:7;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel Malformed Range Code Execution attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|18 00 1F|"; fast_pattern; content:"|00 00 00 00|"; within:4; distance:8; byte_test:2,>,32767,-6,relative,little; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,15780; reference:cve,2005-4131; classtype:attempted-user; sid:24269; rev:7;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel Malformed Range Code Execution attempt"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"|18 02 1F|"; content:"|00 00 00 00|"; within:4; distance:8; byte_test:2,>,32767,-6,relative,little; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,15780; reference:cve,2005-4131; classtype:attempted-user; sid:24268; rev:7;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel Malformed Range Code Execution attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|18 00 1F|"; fast_pattern; content:"|00 00 00 00|"; within:4; distance:8; byte_test:2,>,32767,-6,relative,little; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,15780; reference:cve,2005-4131; classtype:attempted-user; sid:24267; rev:8;) alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office MSCOMCTL ActiveX control tabstrip method attempt"; flow:to_server,established; flowbits:isset,file.rtf; flowbits:isset,mscomctl; file_data; content:"9665fb1e7c85d111b16a00c0f0283628"; nocase; content:"21433412"; distance:0; nocase; content:"01efcdab"; distance:0; nocase; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service smtp; reference:cve,2012-1856; reference:cve,2013-1313; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-060; reference:url,technet.microsoft.com/en-us/security/bulletin/MS13-020; classtype:attempted-user; sid:24006; rev:13;) alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office MSCOMCTL ActiveX control tabstrip method access"; flow:to_server,established; content:"4D53436F6D63746C4C69622E5461625374726970"; fast_pattern:only; flowbits:set,mscomctl; flowbits:noalert; metadata:service smtp; classtype:misc-activity; sid:24005; rev:13;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office MSCOMCTL ActiveX control tabstrip method access"; flow:to_client,established; file_data; content:"MSComctlLib.TabStrip"; fast_pattern:only; flowbits:set,mscomctl; flowbits:noalert; metadata:service ftp-data, service http, service imap, service pop3; classtype:misc-activity; sid:24004; rev:12;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office EMF image EMFPlusPointF record memory corruption attempt"; flow:to_client,established; file_data; content:"|02 04 ED 9F F3 EE 77 BA A1 09 E7 97 42 49 07 A4 39 2E FF 00 D8 05 00 00 01 00 00 00 00 00 00 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-0167; classtype:attempted-user; sid:23989; rev:7;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Visio DXF file text overflow attempt"; flow:to_client,established; flowbits:isset,file.dxf; file_data; content:"ENTITIES"; content:"MTEXT"; distance:0; content:"|5C|O"; distance:0; isdataat:250,relative; content:!"|3B|"; within:250; content:!"|5C 5C|"; within:250; distance:-250; content:!"|5C|0"; within:250; distance:-250; metadata:policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-1888; reference:url,technet.microsoft.com/en-us/security/bulletin/ms12-059; classtype:attempted-user; sid:23957; rev:9;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office MSCOMCTL ActiveX control tabstrip method attempt"; flow:to_client,established; flowbits:isset,file.rtf; flowbits:isset,mscomctl; file_data; content:"9665fb1e7c85d111b16a00c0f0283628"; nocase; content:"21433412"; distance:0; nocase; content:"01efcdab"; distance:0; nocase; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-1856; reference:cve,2013-1313; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-060; reference:url,technet.microsoft.com/en-us/security/bulletin/MS13-020; classtype:attempted-user; sid:23844; rev:14;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Visio DXF file text overflow attempt"; flow:to_client,established; flowbits:isset,file.dxf; file_data; content:"ENTITIES"; content:"MTEXT"; distance:0; content:"|5C|L"; distance:0; isdataat:250,relative; content:!"|3B|"; within:250; content:!"|5C 5C|"; within:250; distance:-250; content:!"|5C|0"; within:250; distance:-250; metadata:policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-1888; reference:url,technet.microsoft.com/en-us/security/bulletin/ms12-059; classtype:attempted-user; sid:23842; rev:13;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Drawing object code execution attempt"; flow:to_client,established; file_data; flowbits:isset,recordtype; content:"|EC 00|"; byte_extract:2,0,record,relative,little; content:"|0F 00 02 F0|"; within:4; content:"|0B F0|"; within:record; byte_extract:2,0,record2,relative,little; content:"|80 00|"; within:record2; content:!"|00 00 00 00|"; within:4; content:"|5D 00|"; content:"|15 00|"; within:2; distance:2; content:"|05 00|"; within:2; distance:2; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,23826; reference:cve,2007-1747; reference:url,technet.microsoft.com/en-us/security/bulletin/ms07-023; classtype:attempted-user; sid:23370; rev:8;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt"; flow:to_client,established; flowbits:isset,file.rtf; file_data; content:"D0CF11E0"; content:"436F626A"; distance:0; nocase; byte_test:8,=,0x64000000,0,relative,string,hex; byte_test:8,>,0x08000000,8,relative,string,hex; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-0158; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-027; classtype:attempted-user; sid:23305; rev:10;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel rtMergeCells heap overflow attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|E5 00|"; byte_test:2,>,0,0,little,relative; byte_test:2,<,1027,2,little,relative; byte_extract:2,4,rwFirst,relative,multiplier 1,little; byte_test:2,=,rwFirst,0,little,relative; byte_test:2,>,0x3fff,4,little,relative; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-0185; reference:url,technet.microsoft.com/en-us/security/bulletin/ms12-030; classtype:attempted-user; sid:23227; rev:8;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel zero-width worksheet code execution attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"Sheet"; fast_pattern; byte_test:4,=,0,3,little,relative; content:"Worksheets"; within:100; nocase; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,15926; classtype:attempted-user; sid:23151; rev:7;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Visio TAG_xxxSect code execution attempt"; flow:to_client,established; flowbits:isset,file.visio; file_data; content:"|00 00 00 00 00 00 00 00 6D 00 FF FF 00 00 05 00 20 00 00 00 04 00 FF FF FF FF FF FF|"; fast_pattern:only; metadata:policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-0019; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-015; classtype:attempted-user; sid:23059; rev:9;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel SXLI record integer overrun attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|B5 00 14 00 00 80 00 00 01 00 00 10 00 00 00 00 00 00 01 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-0184; reference:url,technet.microsoft.com/en-us/security/bulletin/ms12-030; classtype:attempted-user; sid:23009; rev:9;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel Malformed SELECTION Record Code Execution attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|00 00 00 1D 00 0F 00 03|"; byte_test:2,>=,0,4,relative,little; byte_test:2,>,1369,6,relative,little; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,18853; reference:cve,2006-1301; classtype:attempted-user; sid:22954; rev:11;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel SERIES record SerAuxErrBar sdtX memory corruption attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|03 10 0C 00|"; byte_test:2,<=,32767,4,relative,little; byte_test:2,<=,32767,6,relative,little; content:"|01 00|"; within:2; distance:8; byte_test:2,<=,32767,0,relative,little; byte_test:2,!=,1,-10,relative,little; content:"|4A 10 02 00 01 00 5B 10 0E 00|"; within:50; distance:222; metadata:policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-1847; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-030; classtype:attempted-user; sid:22094; rev:10;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel SERIES record SerAuxTrend sdtX memory corruption attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|03 10 0C 00|"; byte_test:2,<=,32767,4,relative,little; byte_test:2,<=,32767,6,relative,little; content:"|01 00|"; within:2; distance:8; byte_test:2,<=,32767,0,relative,little; byte_test:2,!=,1,-10,relative,little; content:"|4A 10 02 00 01 00 4B 10 1C 00|"; within:50; distance:222; metadata:policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-1847; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-030; classtype:attempted-user; sid:22093; rev:10;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel SERIES record sdtY memory corruption attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|03 10 0C 00|"; byte_test:2,<=,3,0,relative,little; content:"|03 00|"; within:2; distance:2; metadata:policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-1847; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-030; classtype:attempted-user; sid:22092; rev:10;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel SXLI record integer overrun attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|B5 00 1E 00 00 80 00 00 01 00 00 00 00 00 00 00 00 00 01 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-0184; reference:url,technet.microsoft.com/en-us/security/bulletin/ms12-030; classtype:attempted-user; sid:22091; rev:10;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel invalid Window2 BIFF record value attempt"; flow:to_client,established; flowbits:isset,file.xls&file.ole; file_data; content:"|FF FE|"; offset:28; content:"|3D 00 12 00|"; distance:0; content:"|3E 02 0A 00|"; within:10; distance:12; fast_pattern; byte_test:1,!&,2,1,relative,little; byte_test:1,!&,240,1,relative,little; content:"|00 00|"; within:2; distance:8; pcre:!"/(?=\x3e\x02\x0a\x00.[\x05-\xff].{6}\x00\x00)/si"; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,53374; reference:cve,2011-1275; reference:cve,2012-0143; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-030; classtype:attempted-user; sid:22078; rev:15;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel ObjectLink invalid wLinkVar2 value attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|27 10|"; content:"|04 00|"; within:2; distance:2; byte_test:2,<,0xff,0,relative,little; byte_test:2,>,0x7cff,2,relative,little; byte_test:2,<,0xffff,2,relative,little; metadata:policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,53373; reference:cve,2012-0142; reference:url,technet.microsoft.com/en-us/security/bulletin/ms12-030; classtype:attempted-user; sid:22077; rev:12;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel invalid Window2 BIFF record value attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|3E 02 0A 00|"; byte_test:1,!&,240,1,relative,little; byte_test:2,>=,0xff00,1,relative,little; content:"|00 00|"; within:2; distance:8; metadata:policy max-detect-ips drop, policy security-ips alert, service ftp-data, service http, service imap, service pop3; reference:cve,2012-0141; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-030; classtype:attempted-user; sid:22076; rev:11;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Visio IndexDirectorySize greater than ChildrenSize memory access attempt"; flow:to_client,established; flowbits:isset,file.visio; file_data; content:"|80 00 00 80 80 00 C0 C0 C0 00 E6 E6 E6 00 CD CD CD 00 B3 B3 B3 00 9A 9A 9A 00 80 80 80 00 66 66 66 00 4D 4D 4D 00 33 33 33 00 1A 1A 1A 00 18 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-0018; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-031; classtype:attempted-user; sid:22075; rev:10;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word ScriptBridge OCX controller attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"O|00|C|00|X|00|D|00|A|00|T|00|A|00|"; content:"ScriptBridge"; distance:0; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:url,www.adobe.com/support/security/bulletins/apsb12-09.html; classtype:attempted-user; sid:22066; rev:8;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel style record overflow attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|E0 00 14 00|"; byte_test:1,&,0x04,4,relative,little; byte_test:1,!&,0x08,4,relative,little; byte_test:1,&,0x10,4,relative,little; byte_test:1,&,0x20,4,relative,little; byte_test:1,&,0x40,4,relative,little; byte_test:1,&,0x80,4,relative,little; byte_test:1,=,255,5,relative,little; content:"|93 02 04 00|"; distance:0; byte_test:1,>=,160,0,relative,little; byte_test:1,>=,8,1,relative,little; byte_test:1,!&,0x10,1,relative,little; byte_test:1,!&,0x20,1,relative,little; byte_test:1,!&,0x40,1,relative,little; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2008-0114; reference:url,technet.microsoft.com/en-us/security/bulletin/MS08-014; classtype:attempted-user; sid:22052; rev:8;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt"; flow:to_client,established; flowbits:isset,file.rtf; file_data; content:"21433412"; content:"A3E81207"; distance:0; nocase; content:"436F626A"; distance:0; nocase; byte_test:8,>,0x08000000,8,relative,string,hex; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-0158; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-027; classtype:attempted-user; sid:21937; rev:11;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Works 9 and Word 12 converter heap overflow attempt"; flow:to_client,established; flowbits:isset,file.ole; file_data; content:"CHNKWKS "; content:"|F8 01|"; within:2; distance:16; content:"|18 00|"; within:2; distance:6; byte_test:1,>,0x18,22,relative; metadata:policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-0177; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-028; classtype:attempted-user; sid:21935; rev:9;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel style handling overflow attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|FF 93 02|"; byte_test:2,>,40,0,relative,little; byte_test:2,>,733,4,relative,little; byte_test:1,!&,0x80,3,relative,little; content:"|00|"; within:1; distance:6; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,18872; reference:cve,2006-3431; reference:url,technet.microsoft.com/en-us/security/bulletin/ms06-059; classtype:attempted-user; sid:21927; rev:11;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt"; flow:to_client,established; flowbits:isset,file.rtf; file_data; content:"21433412"; content:"8E7EE1E6"; distance:0; nocase; content:"436F626A"; distance:0; nocase; byte_test:8,>,0x08000000,8,relative,string,hex; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-0158; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-027; classtype:attempted-user; sid:21906; rev:12;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt"; flow:to_client,established; flowbits:isset,file.rtf; file_data; content:"21433412"; content:"B13CC16A"; distance:0; nocase; content:"436F626A"; distance:0; nocase; byte_test:8,>,0x08000000,8,relative,string,hex; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-0158; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-027; classtype:attempted-user; sid:21905; rev:12;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt"; flow:to_client,established; flowbits:isset,file.rtf; file_data; content:"21433412"; content:"0036D8F4"; distance:0; nocase; content:"436F626A"; distance:0; nocase; byte_test:8,>,0x08000000,8,relative,string,hex; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-0158; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-027; classtype:attempted-user; sid:21904; rev:12;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt"; flow:to_client,established; flowbits:isset,file.rtf; file_data; content:"21433412"; content:"8B8DDA58"; distance:0; nocase; content:"436F626A"; distance:0; nocase; byte_test:8,>,0x08000000,8,relative,string,hex; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-0158; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-027; classtype:attempted-user; sid:21903; rev:12;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt"; flow:to_client,established; flowbits:isset,file.rtf; file_data; content:"21433412"; content:"4E087DEB"; distance:0; nocase; content:"F626A"; distance:0; nocase; byte_test:8,>,0x08000000,8,relative,string,hex; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-0158; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-027; classtype:attempted-user; sid:21902; rev:13;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|21 43 34 12|"; content:"|A3 E8 13 07|"; distance:0; content:"|43 6F 62 6A|"; distance:0; byte_test:4,>,8,4,relative,little; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-0158; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-027; classtype:attempted-user; sid:21901; rev:7;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|21 43 34 12|"; content:"|8E 7E E1 E6|"; distance:0; content:"|43 6F 62 6A|"; distance:0; byte_test:4,>,8,4,relative,little; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-0158; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-027; classtype:attempted-user; sid:21900; rev:7;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|21 43 34 12|"; content:"|B1 3C C1 6A|"; distance:0; content:"|43 6F 62 6A|"; distance:0; byte_test:4,>,8,4,relative,little; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-0158; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-027; classtype:attempted-user; sid:21899; rev:7;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|21 43 34 12|"; content:"|00 36 D8 F4|"; distance:0; content:"|43 6F 62 6A|"; distance:0; byte_test:4,>,8,4,relative,little; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-0158; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-027; classtype:attempted-user; sid:21898; rev:7;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|21 43 34 12|"; content:"|8B 8D DA 58|"; distance:0; content:"|43 6F 62 6A|"; distance:0; byte_test:4,>,8,4,relative,little; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-0158; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-027; classtype:attempted-user; sid:21897; rev:7;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Windows common controls MSCOMCTL.OCX buffer overflow attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|21 43 34 12|"; content:"|4E 08 7D EB|"; distance:0; content:"|43 6F 62 6A|"; distance:0; byte_test:4,>,8,4,relative,little; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-0158; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-027; classtype:attempted-user; sid:21896; rev:7;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE MSCOMCTL ActiveX control deserialization arbitrary code execution attempt"; flow:to_client,established; file_data; content:"5FDC81917DE08A41A6AC"; fast_pattern:only; pcre:"/5FDC81917DE08A41A6AC(E9B8ECA1EE.8|.98ECB1EEA8E)/smi"; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-0158; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-027; classtype:attempted-user; sid:21801; rev:9;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE MSCOMCTL ActiveX control deserialization arbitrary code execution attempt"; flow:to_client,established; file_data; content:"B69041C78985D1116AD1283628F0C000"; fast_pattern:only; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-0158; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-027; classtype:attempted-user; sid:21800; rev:9;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE MSCOMCTL ActiveX control deserialization arbitrary code execution attempt"; flow:to_client,established; file_data; content:"E0F86B9944805046EBAD9CE91439010B"; fast_pattern:only; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-0158; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-027; classtype:attempted-user; sid:21799; rev:9;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE MSCOMCTL ActiveX control deserialization arbitrary code execution attempt"; flow:to_client,established; file_data; content:"4BF0D1BD8B85D1116ab1283628f0c000"; fast_pattern:only; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-0158; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-027; classtype:attempted-user; sid:21798; rev:9;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE MSCOMCTL ActiveX control deserialization arbitrary code execution attempt"; flow:to_client,established; file_data; content:"4BF0D1BD8B85D111B16A00C0F0283628"; fast_pattern:only; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-0158; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-027; classtype:attempted-user; sid:21797; rev:9;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Publisher Opltc memory corruption attempt"; flow:to_client,established; flowbits:isset,file.pub; file_data; content:"|00 FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF|"; isdataat:13279,relative; content:"|00 0A 20 E0 8E 00 00 0B 20 E0 8E 00 00 0C 20 E0|"; within:16; distance:13280; fast_pattern; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2011-3410; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-091; classtype:attempted-user; sid:21423; rev:13;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel Lel record memory corruption attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|00 88 A3 40 01 02 06 00 18 01 02 00 61 62 C0 00 C0 19 10 0D 00 06 00 24 00 05 00 02 00 0F 00 02|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2011-3403; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-096; classtype:attempted-user; sid:21422; rev:11;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel MergeCells record parsing code execution attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|E5 00 0A 00 01 00 00 00 04 00 00 02 05 00 EF 00 06 00 00 00 37 00 00 00 0A 00 00 00 09 08 10 00 00 06|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,43652; reference:cve,2010-3237; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-080; classtype:attempted-user; sid:21415; rev:10;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Visio TAG_xxxSheet code execution attempt"; flow:to_client,established; flowbits:isset,file.visio; file_data; content:"|00 00 03 00 32 00 00 00 01 54 00 00 E8 00 00 00 00 00 00 00 46 E0 EF F7 FB FD 7E 0F 40 46 E0|"; fast_pattern:only; metadata:policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-0136; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-015; classtype:attempted-user; sid:21307; rev:12;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Visio TAG_OLEChunk code execution attempt"; flow:to_client,established; flowbits:isset,file.visio; file_data; content:"|68 00 00 00 02 54 00 00 DC 00 00 00 00 00 00 00 40 E3 EF F7 FB FD 7E DF 3F 40 C0 5C 2E 97 CB E5 D2 3F 40 E0 EF F7 FB FD 7E EF 3F 40 BA 5C 2E 97 CB|"; fast_pattern:only; metadata:policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-0020; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-015; classtype:attempted-user; sid:21302; rev:12;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Visio TAG_xxxSect code execution attempt"; flow:to_client,established; flowbits:isset,file.visio; file_data; content:"|73 00 FF FF 00 D6 03 00 20 00 00 00 03 00 FF FF FF FF FF FF FF FF 00 00 00 00 00 00 00 00 00 00 00 00 00 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2012-0019; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-015; classtype:attempted-user; sid:21301; rev:12;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Publisher 2003 EscherStm memory corruption attempt"; flow:to_client,established; flowbits:isset,file.pub; file_data; content:"|00 0B 00 0B 00 00 00 00 00 00 00 AA 00 00 00 03 A0 41 41 41 FF|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,50949; reference:cve,2011-3411; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-091; classtype:attempted-user; sid:21243; rev:12;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office OLESS stream object name corruption attempt"; flow:to_client,established; flowbits:isset,file.ole; file_data; content:"|49 00 4F 00 00 00 44 00 72 00 61 00 77 00 69 00 6E 00 67 00 30 00 00 00 41 41 41 41|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,50977; reference:cve,2011-3400; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-093; reference:url,www.securityfocus.com/bid/50977; classtype:attempted-user; sid:21170; rev:13;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word border use-after-free attempt"; flow:to_client,established; flowbits:isset,file.docx; file_data; content:"|10 39 6D 4A 7B EE D9 8C 8E 3C C9 46 BB 45 B7 CB 96 6B 8C DB D3 32 23 0A 47 D8 81 CC 7B 46 E2 C4|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2011-1983; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-099; classtype:attempted-user; sid:21002; rev:12;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word border use-after-free attempt"; flow:to_client,established; flowbits:isset,file.docx; file_data; content:"|D4 D5 56 69 9F 98 F1 99 39 67 6E 62 7B F7 AB A9 A3 13 D7 46 80 CC C9 62 9E 90 88 CB 02 98 90 C7|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2011-1983; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-089; classtype:attempted-user; sid:20724; rev:14;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office PowerPoint invalid OfficeArtSpContainer subrecord type confusion attempt"; flow:to_client,established; flowbits:isset,file.ppt; file_data; content:"|0F 00 04 F0|"; byte_extract:4,0,reclen,relative,little; content:"|00 00 1F F0 08 00 00 00|"; within:reclen; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,50964; reference:cve,2011-3413; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-094; classtype:attempted-user; sid:20722; rev:21;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Publisher 2003 EscherStm memory corruption attempt"; flow:to_client,established; flowbits:isset,file.pub; file_data; content:"|03 80 79 6A D5 FF 04 20 F5 01 2A 00 3A 01 11 F0 0A 00 00 00 0A 00 00 00 01 68 42 01|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,50949; reference:cve,2011-3411; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-091; classtype:attempted-user; sid:20720; rev:16;) # alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"FILE-OFFICE Microsoft Office PowerPoint pp4x322.dll dll-load exploit attempt"; flow:to_server,established; content:"|2F|pp4x322.dll"; nocase; http_uri; metadata:policy max-detect-ips drop, service http; reference:cve,2011-3396; reference:url,attack.mitre.org/techniques/T1038; reference:url,attack.mitre.org/techniques/T1129; reference:url,attack.mitre.org/techniques/T1157; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-094; classtype:attempted-user; sid:20703; rev:13;) # alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"FILE-OFFICE Microsoft Office PowerPoint pp7x32.dll dll-load exploit attempt"; flow:to_server,established; content:"|2F|pp7x32.dll"; nocase; http_uri; metadata:policy max-detect-ips drop, service http; reference:cve,2011-3396; reference:url,attack.mitre.org/techniques/T1038; reference:url,attack.mitre.org/techniques/T1129; reference:url,attack.mitre.org/techniques/T1157; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-094; classtype:attempted-user; sid:20702; rev:13;) # alert tcp $HOME_NET any -> $HOME_NET [139,445] (msg:"FILE-OFFICE Microsoft Office PowerPoint pp4x322.dll dll-load exploit attempt"; flow:to_server,established; content:"p|00|p|00|4|00|x|00|3|00|2|00|2|00|.|00|d|00|l|00|l|00 00 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service netbios-ssn; reference:cve,2011-3396; reference:url,attack.mitre.org/techniques/T1038; reference:url,attack.mitre.org/techniques/T1129; reference:url,attack.mitre.org/techniques/T1157; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-094; classtype:attempted-user; sid:20701; rev:13;) # alert tcp $HOME_NET any -> $HOME_NET [139,445] (msg:"FILE-OFFICE Microsoft Office PowerPoint pp7x32.dll dll-load exploit attempt"; flow:to_server,established; content:"p|00|p|00|7|00|x|00|3|00|2|00|.|00|d|00|l|00|l|00 00 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service netbios-ssn; reference:cve,2011-3396; reference:url,attack.mitre.org/techniques/T1038; reference:url,attack.mitre.org/techniques/T1129; reference:url,attack.mitre.org/techniques/T1157; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-094; classtype:attempted-user; sid:20700; rev:13;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word document summary information string overflow attempt"; flow:to_client,established; file_data; content:"|00 00 00 00 1D 00 0F 00 03 00 00 00 00 00 FF FF FF FF FF FF FF 00 00 0D 00 02 00 01 00 0C 00 02 00 64 00 0F 00 02 00 01 00 11 00 02 00 00 00 10|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2006-1540; reference:url,technet.microsoft.com/en-us/security/bulletin/ms06-038; classtype:attempted-user; sid:20141; rev:14;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word document summary information string overflow attempt"; flow:to_client,established; file_data; content:"|E0 85 9F F2 F9|Oh|10 AB 91 08 00|+'|B3 D9|"; content:"|1E 00 00 00|"; distance:0; content:"|63 65 6C 00 40 00 00 00 80 4E 50 3F D6 30 C6 01 40 00 00 00 00 F3 0F 47 D6 30 C6 01 03 00 00 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2006-1540; reference:url,technet.microsoft.com/en-us/security/bulletin/ms06-038; classtype:attempted-user; sid:20140; rev:14;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word document summary information string overflow attempt"; flow:to_client,established; file_data; content:"|02 D5 CD D5 9C|.|1B 10 93 97 08 00|+,|F9 AE|"; content:"|1E 00 00 00|"; distance:0; content:"|74 33 00 00 00 00 00 43 65 6C 6C 31 00 0C 10 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2006-1540; reference:url,technet.microsoft.com/en-us/security/bulletin/ms06-038; classtype:attempted-user; sid:20139; rev:15;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office invalid MS-OGRAPH DataFormat buffer overflow attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|06 10 08 00 FF FF|"; byte_test:2,>,255,2,little,relative; byte_extract:2,0,yi,little,relative; byte_test:2,>,yi,0,little,relative; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,49517; reference:cve,2011-1990; reference:url,technet.microsoft.com/en-us/security/bulletin/ms11-072; classtype:attempted-user; sid:20128; rev:20;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel Conditional Formatting record vulnerability"; flow:to_client,established; file_data; flowbits:isset,file.xls; file_data; content:"|3B 20 02 80 00 04 C0 02 02 00 00 00 C0 65 01 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2011-1989; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-072; classtype:attempted-user; sid:20127; rev:14;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel invalid Lbl record attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|09 00|"; depth:2; content:"scen_num|1E|"; distance:0; byte_test:1,<,0x7FFF,0,relative,little; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,49478; reference:cve,2011-1988; reference:url,technet.microsoft.com/en-us/security/bulletin/ms11-072; classtype:attempted-user; sid:20124; rev:17;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel File Importing Code Execution"; flow:to_client,established; flowbits:isset,file.slk; file_data; content:"ID|3B|"; depth:3; pcre:"/ID\x3b[^A-Z]/"; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,28095; reference:cve,2008-0112; reference:url,technet.microsoft.com/en-us/security/bulletin/MS08-014; classtype:attempted-user; sid:20062; rev:13;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel FNGROUPNAME record memory corruption attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|9A 00 09 00 FF FF 00 00 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,38553; reference:cve,2010-0262; reference:url,technet.microsoft.com/en-us/security/bulletin/ms10-017; classtype:attempted-user; sid:20029; rev:14;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel MsoDrawingGroup record remote code execution attempt"; flow:to_client,established; flowbits:isset,file.xls&file.ole; file_data; content:"|09 08|"; content:"|0A 00|"; distance:6; content:"|EB 00|"; byte_test:2,>,0,0,relative,little; byte_jump:2,0,relative,little; isdataat:2,relative; content:!"|EC 00|"; within:2; distance:2; content:"|5D 00 1A 00 15 00 12 00|"; within:8; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,35243; reference:cve,2009-0559; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-021; classtype:attempted-user; sid:19943; rev:16;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Publisher 2007 pointer dereference attempt"; flow:to_client,established; flowbits:isset,file.pub; file_data; content:"|01 2C 01 2B 01 2A 01 2F 01 2E 01 2D 01 52 00 12 12 00 00 00|"; content:"|02 00 13 00|"; within:4; distance:11; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,35599; reference:cve,2009-0566; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-030; classtype:attempted-user; sid:19932; rev:14;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office PowerPoint TextCharsAtom record buffer overflow attempt"; flow:to_client,established; flowbits:isset,file.ppt; file_data; content:"|00 00 A0 0F|"; byte_test:1,>,127,3,relative,little; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,38108; reference:cve,2010-0034; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-004; classtype:attempted-user; sid:19894; rev:18;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word Converter sprmTSplit overflow attempt"; flow:to_client,established; file_data; content:"|00 00 29 76 00 FF E0 01 13 D6 30 00 00 00 FF 04 01 00 00 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2011-0028; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-033; classtype:attempted-user; sid:19707; rev:13;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Visio invalid UMLString data length exploit attempt"; flow:to_client,established; file_data; content:"|50 0F DF 21 DF 79 08 C8 AE CC ED D2 D0 E0 AF 00 8F BF 04 BF|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2011-1979; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-060; classtype:attempted-user; sid:19675; rev:15;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel format record code execution attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|D0 CF 11 E0 A1 B1 1A E1|"; depth:8; content:"|09 08 10 00 00 06|"; distance:0; content:"|1E 04|"; distance:0; fast_pattern; byte_test:2,>,392,2,relative,little; byte_test:2,>,4,0,relative,little; byte_test:2,<,256,4,relative,little; content:"Sheet1"; distance:0; nocase; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2008-3005; reference:url,technet.microsoft.com/en-us/security/bulletin/MS08-043; classtype:attempted-user; sid:19552; rev:15;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Word sprmCMajority record buffer overflow attempt"; flow:to_server,established; flowbits:isset,file.doc; file_data; content:"|FF FF EC A5|"; byte_test:2,<,0xA4,0,relative,little; content:"|47 CA|"; content:"|3E C6|"; within:2; distance:1; byte_test:1,>,0x54,0,relative,little; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,42136; reference:cve,2010-1900; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-056; classtype:attempted-user; sid:19459; rev:15;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word sprmCMajority record buffer overflow attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|FF FF EC A5|"; byte_test:2,<,0xA4,0,relative,little; content:"|47 CA|"; content:"|3E C6|"; within:2; distance:1; byte_test:1,>,0x54,0,relative,little; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,42136; reference:cve,2010-1900; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-056; classtype:attempted-user; sid:19458; rev:15;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office embedded Office Art drawings execution attempt"; flow:to_client,established; flowbits:isset,file.ole; file_data; content:"|00 00 05 00 00 00 07 08 00 00 0F 00 EF 03 00 00 00 00 0F 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,38073; reference:cve,2010-0243; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-003; classtype:attempted-user; sid:19442; rev:14;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Publisher 2007 and earlier stack buffer overflow attempt"; flow:to_client,established; flowbits:isset,file.pub; file_data; content:"|1D 00 01 04 01 00 00 04 FA 00 01 00 00 00 00 00 00 00 00 00 00 00 6C 02 00 41 41 41 41|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,39347; reference:cve,2010-0479; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-023; classtype:attempted-user; sid:19414; rev:15;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Publisher 2007 and earlier stack buffer overflow attempt"; flow:to_client,established; file_data; content:"|1D 00 00 04 01 00 01 00 02 00 01 00 00 00 00 00 00 00 00 00 00 00 AE 02 00 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,39347; reference:cve,2010-0479; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-023; classtype:attempted-user; sid:19413; rev:16;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel RealTimeData record parsing memory corruption"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|01 00 00 00 FF FF FF FF 00 11 6D 79 63 6F 6D 61|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,40525; reference:cve,2010-1247; classtype:attempted-user; sid:19412; rev:13;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Outlook SMB attach by reference code execution attempt"; flow:to_client,established; file_data; content:"file://c:|5C|windows|5C|system32|5C|calc.exe?oooo.dat"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,41446; reference:cve,2010-0266; reference:url,technet.microsoft.com/en-us/security/bulletin/ms10-045; classtype:attempted-user; sid:19405; rev:14;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word sprmTDiagLine80 record parsing stack buffer overflow attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|6C 00 65 00 20 00 47 00 72 00 69 00 64 00 00 00 37 00 3A 56 0F 00 2A D6 30 00 00 00 FF 04 01|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,43760; reference:cve,2010-3214; classtype:attempted-admin; sid:19317; rev:12;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Publisher pubconv.dll corruption attempt"; flow:to_client,established; flowbits:isset,file.pub; file_data; content:"|39 00 39 00 39 00 39 01 1D 00 04 04 01 00 01 00 E2 00 01 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,45277; reference:cve,2010-2569; classtype:attempted-user; sid:19306; rev:14;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office PowerPoint out of bounds value remote code execution attempt"; flow:to_client,established; flowbits:isset,file.ppt; file_data; content:"|C3 0B 08|"; fast_pattern; byte_test:1,<,0x1,7,relative,little; content:"|C3 0B|"; distance:0; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,38104; reference:cve,2010-0032; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-004; classtype:attempted-user; sid:19303; rev:16;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office PowerPoint improper filename remote code execution attempt"; flow:to_client,established; content:"powerpoint"; fast_pattern:only; pcre:"/Content\x2DDisposition\x3A\s*attachment[^\x0D\x0A]+name\x3D[^\x0D\x0A\x5C\x2F\x3A\x2A\x3F\x3C\x3E\x7C\x3D\s]{200}/i"; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-0029; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-004; classtype:attempted-user; sid:19296; rev:15;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word HTML linked objects memory corruption attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|00 00 00 46 00 00 00 13 3A 9F FF 9F 8C 0F 00 00 F0 38 00 00 00 00 00 06 F0 18 00 00 00 02 08 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,42130; reference:cve,2010-1903; reference:url,technet.microsoft.com/en-us/security/bulletin/ms10-056; classtype:attempted-user; sid:19295; rev:17;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel Chart Sheet Substream memory corruption attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|02 10 10 00|"; content:"|33 10 00 00 55 08 0C 00|"; distance:0; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,40521; reference:cve,2010-0823; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-038; classtype:attempted-user; sid:19294; rev:14;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel malformed MsoDrawingObject record attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|07 00 00 00 01 00 00 00 33 00 0B F0 12 00 00 00 46 C5 41 41 41|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-3335; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-087; classtype:attempted-user; sid:19260; rev:16;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel WOpt record memory corruption attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|0B 08|"; content:"|0B 08|"; within:2; distance:2; byte_extract:2,14,num_charw,relative,multiplier 2,little; byte_test:2,<,num_charw,-20,relative,little; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,40522; reference:cve,2010-0824; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-038; classtype:attempted-user; sid:19259; rev:15;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel SxView record memory pointer corruption attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|B0 00 3D 00 02 00 06 00 00 00 03 00 03 00 04 00 01 00 41 41|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,40523; reference:cve,2010-1245; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-038; classtype:attempted-user; sid:19258; rev:15;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel Scenario heap memory overflow"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|AF 00 48 00 01 00 01 00 0D|"; byte_jump:1,0,relative,little,post_offset 1; content:"|CE 00 00|"; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2011-1275; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-045; classtype:attempted-user; sid:19227; rev:16;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel SerAuxTrend biff record corruption attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|4B 10|"; fast_pattern; content:"|00|"; within:1; distance:2; byte_test:1,>,0x06,0,relative; content:"|FF FF FF FF|"; within:4; distance:1; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,48159; reference:cve,2011-1274; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-045; classtype:attempted-user; sid:19225; rev:18;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel ObjBiff validation exploit attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|00 85 00 0D 00 10 06 00 00 00 02 06 53 68 65|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2011-1273; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-045; classtype:attempted-user; sid:19222; rev:15;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel pivot item index boundary corruption attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"PivotTable"; content:"|B0 00|"; within:200; distance:-200; content:"|00 00|"; within:2; distance:18; byte_extract:2,4,cdim,relative,little; content:"|B2 00|"; within:76; byte_test:2,>,cdim,6,relative,little; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,42199; reference:cve,2010-2562; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-057; classtype:attempted-user; sid:19180; rev:20;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office .CGM file cell array heap overflow attempt"; flow:to_client,established; flowbits:isset,file.cgm; file_data; content:"|20 42 00 01 00 80 41 3F 8F F8 00 00 00 95 00 C7 00 00 00 C7 00 95 00 AA 00 96 00 08 00 00 00 0C|"; fast_pattern:only; metadata:policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-3945; reference:cve,2012-2524; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-105; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-057; classtype:attempted-user; sid:19156; rev:14;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel PtgExtraArray parsing attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|69 6F 6E 60 01 00 00 B4 01 C7 03 42 03 FF 00 01 00 00 41 41 41 41 41|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,43654; reference:cve,2010-3239; classtype:attempted-user; sid:19154; rev:13;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word malformed index code execution attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|02 00 60 00 0C 14 FF 00 04 61 D5 00 B0 00 08 00 53 00 75 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,43766; reference:cve,2010-2750; classtype:attempted-user; sid:19153; rev:14;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Access Wizard control memory corruption ActiveX clsid access"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|27 03 23 53 2B 17 D0 11 AD 40 00 A0 C9 0D C8 D9|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,41442; reference:cve,2010-1881; classtype:attempted-user; sid:19141; rev:14;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel PtgExtraArray data parsing vulnerability exploit attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|39 00 02 00 01 00 0F 00 02 00 1D 00 00 00 FF FF 01 00 C0 09 1B FC 1E 00 23 01 00 00 00 17 0A 00 43 6F 6E 6E 65 63 74 69 6F 6E 60 23 00 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,43647; reference:cve,2010-3231; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-080; classtype:attempted-user; sid:19134; rev:15;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel EntExU2 write access violation attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|0E 00 24 41 41 41 41 24 04 00 02 C0 42 02 04 00 D7 00 0C 00 A2 00 00 00 3C 00 0E 00 0E 00 0E 00 C2 01 0C 00 00 00 06 00 00 00 03 00 02 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,38547; reference:cve,2010-0257; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-017; classtype:attempted-user; sid:19133; rev:15;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel RTD buffer overflow attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|EB 06 90 90 AD 57 00 30 81 C4 24 16 00 00 C3 41|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,40524; reference:cve,2010-1246; classtype:attempted-user; sid:19132; rev:15;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel RTD buffer overflow attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|5A 03 00 00 00 15|excelrtd.rtdfunctions"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,40524; reference:cve,2010-1246; classtype:attempted-user; sid:19131; rev:14;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel with embedded Flash file attachment attempt"; flow:to_server,established; flowbits:isset,file.xls; content:"ZXUw"; fast_pattern:only; pcre:"/[A-Za-z0-9\\x2b\x2f][EUk0]ZXUw[ghijklmnopqr][A-Za-z0-9\\x2b\x2f]/"; metadata:policy max-detect-ips drop, service smtp; classtype:attempted-user; sid:19066; rev:11;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel with embedded Flash file attachment attempt"; flow:to_server,established; flowbits:isset,file.xls; content:"GV1M"; fast_pattern:only; pcre:"/[A-Za-z0-9\\x2b\x2f][A-Za-z0-9\\x2b\x2f][BFJNRVZdhlptx159]GV1M[IJK]/"; metadata:policy max-detect-ips drop, service smtp; classtype:attempted-user; sid:19065; rev:11;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office PowerPoint converter bad indirection remote code execution attempt"; flow:to_client,established; flowbits:isset,file.ppt; file_data; content:"|00 00 20 02 00 00 18 00 00 00 B1 0F 00 00 00 00 00 00 00 00 00 00 00 00 00 01 01 01 00 10 00 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-2572; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-088; classtype:attempted-user; sid:18948; rev:17;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel RealTimeData record exploit attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|09 02 00 00 00 00 00 00 00 00 00 00 5F 78 6C 66 6E 2E 52 54 44 1C 1D 13 08 48 00 13 08 00 00 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,43655; reference:cve,2010-3240; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-080; classtype:attempted-user; sid:18806; rev:20;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Visio Data Type Memory Corruption"; flow:to_client,established; flowbits:isset,file.visio; file_data; content:"|80 12 00 0F 00 41 41 38 A4 EF 66 04 00 02 EC F0|"; content:"|56 41 52 43 48 41 A1 52 DC FF|"; within:10; distance:16; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,46138; reference:cve,2011-0093; classtype:attempted-user; sid:18755; rev:16;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel sheet object type confusion exploit attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|51 10 0F 00 00 02 00 00 00 00 07 00 3A 00 00 00 00 00 00|"; content:"|51 10 13 00 01 02 00 00 00 00 0B 00 3B 00 00 00 00 00 00 01 00 03 00|"; within:23; distance:16; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-0258; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-017; classtype:attempted-user; sid:18740; rev:17;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office RTF malformed pfragments field"; flow:to_client,established; flowbits:isset,file.rtf; file_data; content:"pFragments"; nocase; content:"{|5C|sv"; within:15; nocase; pcre:"/[^\x3b\x7d]*\x3b[^\x3b\x7d]*\x3b.{8}/smiR"; byte_test:4,>,4,0,relative,string,hex; metadata:policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,44652; reference:cve,2010-3333; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-087; classtype:attempted-user; sid:18680; rev:19;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word Converter sprmTTextFflow overflow attempt"; flow:to_client,established; file_data; content:"|29 76 00 FF E0 01 13 D6 30 00 00 00 FF 04 01 00 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,47236; reference:cve,2011-0028; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-033; classtype:attempted-user; sid:18643; rev:17;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel drawing layer use after free attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|0F 00 04 F0|"; fast_pattern; content:!"|0F 00 03 F0|"; within:4; distance:-12; byte_extract:4,0,container_size,relative,little; content:!"|0A F0 08 00 00 00|"; within:6; distance:2; content:"|0B F0|"; within:2; distance:18; content:"|00 00 11 F0 00 00 00 00|"; within:container_size; distance:-20; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,46227; reference:cve,2011-0977; reference:url,technet.microsoft.com/en-us/security/bulletin/ms11-023; classtype:attempted-user; sid:18638; rev:20;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel malformed Label record exploit attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|09 08 08 00 00 05 05 00|"; content:"|04 02|"; distance:0; byte_test:1,&,0x80,9,relative; byte_test:2,>,8,0,relative,little; byte_test:2,<,8225,0,relative,little; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2004-0846; reference:cve,2011-0098; reference:url,technet.microsoft.com/en-us/security/bulletin/MS04-033; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-021; classtype:attempted-user; sid:18632; rev:18;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Works 4.x converter font name buffer overflow attempt"; flow:to_client,established; flowbits:isset,file.works; file_data; content:"|00 00 00 00 A2 04 00 00 00 00 4E 03 00 00 54 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 10 FF 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2009-1533; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-024; classtype:attempted-user; sid:18615; rev:14;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Word with embedded Flash file attachment"; flow:to_server,established; flowbits:isset,file.doc; file_data; content:"CONTROL ShockwaveFlash.ShockwaveFlash"; fast_pattern:only; metadata:policy max-detect-ips drop, service smtp; classtype:attempted-user; sid:18549; rev:17;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Excel with embedded Flash file attachment"; flow:to_server,established; flowbits:isset,file.xls; file_data; content:"ShockwaveFlashObjects"; fast_pattern:only; metadata:policy max-detect-ips drop, service smtp; reference:cve,2016-3279; reference:url,technet.microsoft.com/en-us/security/bulletin/ms16-088; classtype:attempted-user; sid:18548; rev:16;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office PowerPoint with embedded Flash file transfer"; flow:to_client,established; flowbits:isset,file.ppt; file_data; content:"|53 00 68 00 6F 00 63 00 6B 00 77 00 61 00 76 00 65 00 20 00 46 00 6C 00 61 00 73 00 68 00 20 00 4F 00 62 00 6A 00 65 00 63 00 74 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; classtype:attempted-user; sid:18547; rev:17;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word with embedded Flash file transfer"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"CONTROL ShockwaveFlash.ShockwaveFlash"; fast_pattern:only; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2011-0611; reference:url,www.adobe.com/support/security/advisories/apsa11-02.html; classtype:attempted-user; sid:18546; rev:16;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel with embedded Flash file transfer"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"ShockwaveFlashObjects"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2016-3279; reference:url,technet.microsoft.com/en-us/security/bulletin/ms16-088; classtype:attempted-user; sid:18545; rev:16;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel 2007 invalid comments.xml uninitialized pointer access attempt"; flow:to_client,established; file_data; content:"|6C 2F 63 6F 6D 6D 65 6E 74 73 31 2E 78 6D 6C AC AA AA AA AA|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-0263; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-017; classtype:attempted-user; sid:18541; rev:15;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel PtgName invalid index exploit attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|1D 00 00 00 FF FF 21 00 34 02 C7 FC 1E 00 23 30 00 00 00 17|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,43650; reference:cve,2010-3235; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-080; classtype:attempted-user; sid:18538; rev:15;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE OpenOffice.org Microsoft Office Word file processing integer underflow attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|08 D6 05 80 05 94 FF E0 10 2C 22 00 06 4C 11 00 00 00 00 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,38218; reference:cve,2009-3301; classtype:attempted-user; sid:18536; rev:15;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Word file sprmTSetBrc processing buffer overflow attempt"; flow:to_server,established; flowbits:isset,file.doc|file.xls; file_data; content:"|08 D6|"; byte_extract:1,2,NumOfColumns,relative; byte_jump:2,-3,relative,little; content:"|20 D6|"; within:2; distance:-1; byte_test:1,>,NumOfColumns,2,relative; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,38218; reference:cve,2009-3302; reference:cve,2010-2563; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-067; classtype:attempted-user; sid:18535; rev:15;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Visio VSD file icon memory corruption attempt"; flow:to_client,established; file_data; flowbits:isset,file.visio; content:"|A8 00 04 00 01 00 70 00 00 00 20 FF 20 00 00 00 DD 00 00 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2009-0095; reference:url,technet.microsoft.com/en-us/security/bulletin/ms09-005; classtype:attempted-user; sid:18515; rev:18;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office PowerPoint malformed shapeid arbitrary code execution attempt"; flow:to_client,established; file_data; content:"|0A F0 08 00 00 00 01 20 01 00 56 61 9A 92 B3 65 82 F0 30 00 00 00 81 01 00 00 B4 B0|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,28146; reference:cve,2008-0118; reference:url,technet.microsoft.com/en-us/security/bulletin/ms08-016; classtype:attempted-user; sid:18514; rev:15;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Visio ORMinfo classes length overflow attempt"; flow:to_client,established; flowbits:isset,file.visio; file_data; content:"|F2 04 58 41 03 00 47 00 00 00 42 00 00 00 00 00 7B DA 02 EB F0 01 00 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2011-0093; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-008; classtype:attempted-user; sid:18417; rev:16;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Visio ORMinfo classes length overflow attempt"; flow:to_client,established; flowbits:isset,file.visio; file_data; content:"|FF FF FF FF 00 00 98 0C 3C BF 61 D1 D2 C9 00 00 01 00 02|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2011-0093; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-008; classtype:attempted-user; sid:18416; rev:16;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel BRAI record remote code execution attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|02 00 0B 00 51 10 08 00 00 01 01 00 FF 00 00 00 27 10 06 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2009-0549; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-021; classtype:attempted-user; sid:18399; rev:15;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office thumbnail bitmap invalid biClrUsed attempt"; flow:to_client,established; file_data; content:"|C0 9C 83 4A FF F8 CE 11 A0 6B 00 AA 00 A7 11 91 30 00 00 00|"; content:"T|00|h|00|u|00|m|00|b|00|n|00|a|00|i|00|l|00 00 00 41 00 00 00|"; distance:0; content:"|28 00 00 00|"; within:4; distance:4; pcre:"/^(?=.{10}[\x01\x04\x08\x16\x24\x32]\x00)(.{3}[\x55-\xFF]|.{31}[\x80-\xFF])/sR"; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-3970; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-006; classtype:attempted-user; sid:18398; rev:16;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Visio DXF variable name overflow attempt"; flow:to_client,established; flowbits:isset,file.dxf; file_data; content:"HEADER"; content:"9"; distance:0; content:"|0A 24|"; distance:0; isdataat:92,relative; content:!"|0A|"; within:92; pcre:"/HEADER[\x20\r]*\n[\x20]*9[\x20\r]*\n\x24[^\n]{92}/"; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,39836; reference:cve,2010-1681; classtype:attempted-user; sid:18331; rev:11;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office RTF parsing remote code execution attempt"; flow:to_server,established; file_data; content:"|5C|sp"; content:"|5C|sn"; within:100; nocase; content:"pFragments"; within:100; nocase; content:"|5C|sv"; within:100; nocase; pcre:"/\x5Csv\s+[^\x7D]*?\x3B[^\x7D]*?\x3B[^\x7B]{12}/smi"; byte_test:4,>,4,8,relative,little; metadata:policy max-detect-ips drop, policy security-ips drop, service smtp; reference:cve,2010-3333; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-087; classtype:attempted-user; sid:18310; rev:12;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office thumbnail bitmap invalid biClrUsed attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|E0 85 9F F2 F9 4F 68 10 AB 91 08 00 2B 27 B3 D9 30 00 00 00|"; content:"|11 00 00 00|"; distance:0; content:"|47 00 00 00|"; distance:0; content:"|08 00 00 00 28 00 00 00|"; within:8; distance:8; pcre:"/^(?=.{10}[\x01\x04\x08\x16\x24\x32]\x00)(.{3}[\x55-\xFF]|.{31}[\x80-\xFF])/sR"; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-3970; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-006; classtype:attempted-user; sid:18265; rev:15;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office PICT graphics converter memory corruption attempt"; flow:to_client,established; flowbits:isset,file.pct; file_data; content:"|00 A1|"; content:"|49 43|"; within:2; distance:10; byte_test:2,>,4094,0,relative,big; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-3946; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-105; classtype:attempted-user; sid:18235; rev:14;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Publisher Adobe Font Driver code execution attempt"; flow:to_client,established; flowbits:isset,file.otf; file_data; content:"|E0 98 FF FF FF E1 FF 5F FF E2 DF E0 DE 71 DE 9E DE 71 DC 83|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-3956; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-091; classtype:attempted-user; sid:18233; rev:16;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Publisher tyo.oty field heap overflow attempt"; flow:to_client,established; flowbits:isset,file.pub; file_data; content:"|00 19 1D 00 04 04 01 00 01 00 F2 68 01 00 00 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-2569; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-103; classtype:attempted-user; sid:18212; rev:18;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office .CGM file cell array heap overflow attempt"; flow:to_client,established; file_data; content:"|41 3F 80 14 00 00 00 1F 00 1F 00 00 00 1F 00 1F 00 20 00 20 00 00 00 00 05 B8 80 80 FF FF FF 00 01|"; fast_pattern:only; metadata:policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-3945; reference:cve,2012-2524; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-105; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-057; classtype:attempted-user; sid:18200; rev:16;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Art drawing invalid shape identifier attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|0A F0 08 00 00 00|"; byte_test:1,=,0x2,-8,relative; byte_test:4,>,0x03FFD7FF,0,relative,little; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-3336; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-087; classtype:attempted-user; sid:18069; rev:17;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel malformed MsoDrawingObject record attempt"; flow:established, to_client; flowbits:isset,file.xls; file_data; content:"|18 6A CB 01 70 7E 13 F2 DE 6E CB 01 06 00 00 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-3335; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-087; classtype:attempted-user; sid:18068; rev:15;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office RTF parsing remote code execution attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|5C|sp"; content:"|5C|sn"; within:100; nocase; content:"pFragments"; within:100; nocase; content:"|5C|sv"; within:100; nocase; pcre:"/\x5Csv\s+[^\x7D]*?\x3B[^\x7D]*?\x3B[^\x7B]{12}/smi"; byte_test:4,>,4,8,relative,little; metadata:policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-3333; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-087; classtype:attempted-user; sid:18067; rev:14;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office PowerPoint integer underflow heap corruption attempt"; flow:to_client,established; flowbits:isset,file.ppt; file_data; content:"|42 F1 00 00 00 00 03|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-2573; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-088; classtype:attempted-user; sid:18066; rev:17;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office PowerPoint converter bad indirection remote code execution attempt"; flow:to_client,established; flowbits:isset,file.ppt; file_data; content:"|00 00 0D 00 00 00 B0 0F 00 00 FF FF 00 00 8C 01 00 00 18 00 00 00 B1 0F 00 00 00 00 00 00 00 00 00 00 00 00 00 00 B3|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-2572; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-088; classtype:attempted-user; sid:18065; rev:15;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft HtmlDlgHelper ActiveX clsid access"; flow:to_client,established; file_data; content:"3050f4e1-98b5-11cf-bb82-00aa00bdce0b"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-3329; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-071; classtype:attempted-user; sid:17770; rev:18;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel PtgName invalid index exploit attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|06 00 91 00 07 00 01 00 41 00 00 00 E0 29 BD 04 FF FF 00 00 05 00 01 FF 1E 00 23 02 30 00 00 17 0A 00 43 6F 6E 6E 65 63 74 69 6F 6E 60 02|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,43650; reference:cve,2010-3235; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-080; classtype:attempted-user; sid:17764; rev:19;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel RealTimeData record exploit attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|13 08 48 00 13 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 25 00 00 00 00 11 6D 79 63 6F 6D 61 64 64 69 6E 2E 70 72 6F 67 69 64 00 0B 4C 4F 52 45 4D 5F 49 50 53 55 4D 05 50 72 69 63 65 10 00 00 00 2A 00 00 00 00 00 00 00 EA 4E|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,43655; reference:cve,2010-3240; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-080; classtype:attempted-user; sid:17760; rev:18;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel invalid SerAr object exploit attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|BD 04 FF FF 00 00 05 00 01 FF 1E 00 23 02 00 00 00 17 0A 00 43 6F 6E 6E 65 63 74 69 6F 6E 60 02 00 00 00 00 00 04 42 03 FF 00 02 00 00 B6 1E 00 00 5B 44 65 70 74 5D 2E 5B 57 73 7A 79 73 74 6B|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-3239; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-080; classtype:attempted-user; sid:17759; rev:19;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel PtgExtraArray data parsing vulnerability exploit attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|06 00 75 00 14 00 01 00 40 00 00 00 90 22 BD 04 FF FF 00 00 12 00 01 FF 1E 00 23 02 00 00 00 17 0A 00 43 6F 6E 6E 65 63 74 69 6F 6E 60 01 00 00 00 00 00 04 42 03 FF 00 01 00 24|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,43647; reference:cve,2010-3231; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-080; classtype:attempted-user; sid:17758; rev:18;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel CrErr record integer overflow attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|09 08 08 00 00 05|"; content:"|65 08|"; distance:0; byte_test:1,&,0x80,19,relative,little; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-3230; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-080; classtype:attempted-user; sid:17757; rev:16;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word XP PLFLSInTableStream heap overflow attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|5C FE 00 01 02 5C FE 00 01 02 5C FE 00 01 02 5C FE 00 01 02 51 4A|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-3220; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-079; classtype:attempted-user; sid:17756; rev:16;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word RTF parsing memory corruption attempt"; flow:to_client,established; flowbits:isset,file.rtf; file_data; content:"|5C|dpline |5C|dpline |5C|dpline |5C|dpline"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,29104; reference:cve,2008-1091; reference:url,technet.microsoft.com/en-us/security/bulletin/MS08-026; classtype:attempted-user; sid:17743; rev:19;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word remote code execution attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|07 07 07 52 07 45 07 50 07 52 07 4F 07 07 07|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2009-0563; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-027; classtype:attempted-user; sid:17742; rev:16;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel REPT integer underflow attempt"; flow:to_client,established; flowbits:isset,file.xml; file_data; content:"|3D|rept|28|"; nocase; pcre:"/\x3ccell\s+[^\x3e]*\x3aFormula\s*\x3d\s*\x22\s*\x3drept\x28/i"; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,31706; reference:cve,2008-4019; classtype:attempted-user; sid:17734; rev:12;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word remote code execution attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|00 00 0D 0A 11|h|01 13 98 FE 0C|4|00 FF 8F 08 00 00 01 00 00 00 01 00 68 01 78|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2009-0565; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-027; classtype:attempted-user; sid:17690; rev:14;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel malformed formula parsing code execution attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|07 C9 C0 00 00 06 03 00 00 18 00 FF 02 00 00 02 7C 7C 7C 7C|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,28167; reference:cve,2008-0115; reference:url,technet.microsoft.com/en-us/security/bulletin/MS08-014; classtype:attempted-user; sid:17655; rev:15;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word array data handling buffer overflow attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|01 00 00 02 01 00 00 9E 01 00 00 02 01 00 00 96 01 00 00 FF|"; fast_pattern:only; content:"|EC A5|"; depth:2; offset:512; content:"|2E 05 00 00|"; within:4; distance:896; content:"|2C 00 00 00|"; within:4; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,23804; reference:cve,2007-0035; classtype:attempted-user; sid:17649; rev:14;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word crafted sprm structure memory corruption attempt"; flow:to_client,established; flowbits:isset,file.doc|file.ole; file_data; content:"|16 24|"; content:"|17 24|"; within:64; content:"|08 D6|"; within:64; byte_test:2,>,0xfffc,0,relative,little; byte_test:2,<,0xffff,0,relative,little; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,32584; reference:cve,2008-4837; reference:url,technet.microsoft.com/en-us/security/bulletin/MS08-072; classtype:attempted-user; sid:17591; rev:14;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Drawing Record msofbtOPT Code Execution attempt"; flow:to_client,established; file_data; flowbits:isset,file.ole; content:"|0B F0|"; byte_extract:2,0,record,relative,little; content:"|00 00|"; within:2; content:"|A0 03|"; within:record; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,22383; reference:cve,2007-0671; classtype:attempted-user; sid:17579; rev:16;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word Section Table Array Buffer Overflow attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|24 00 61 24 03 00 00 00 00 00 00 00 D1 50 00 00 04 00 00 AC 00 00 00 00 FF FF FF FF 00 00 00 00 CE|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,22225; reference:cve,2007-0515; classtype:attempted-user; sid:17578; rev:16;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Sophos Anti-Virus Visio File Parsing Buffer Overflow attempt"; flow:to_client,established; flowbits:isset,file.visio; file_data; content:"Visio|20 28|TM|29 20|Drawing"; nocase; content:"|77 77 00 80|"; within:4; distance:30; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,14362; reference:cve,2005-2768; classtype:attempted-user; sid:17574; rev:16;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office PowerPoint PP7 File Handling Memory Corruption attempt"; flow:to_client,established; file_data; content:"|08 00 00 00 00 00 00 00 AA FF FF 3F 00 00 00 00 FD 03 00 00 01 00 00 00 34 00 00 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,34880; reference:cve,2009-0225; classtype:attempted-user; sid:17565; rev:12;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word global array index heap overflow attempt"; flow:to_client,established; flowbits:isset,file.doc|file.ole; file_data; content:"|31 90|"; content:"|1F B0|"; within:64; content:"|33 50|"; within:64; fast_pattern; byte_test:4,>,5,0,relative,little; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,32583; reference:cve,2008-4026; classtype:attempted-user; sid:17560; rev:15;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word Font Parsing Buffer Overflow attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|04 05 02 03 04 87 7A 00 20 00 00 00 80 08 00 00 00 00 00 00 00 FF 01 00 00 00 00 00 00 44 44|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,14216; reference:cve,2005-0564; classtype:attempted-user; sid:17550; rev:16;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel Column record handling memory corruption attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|00 00 00 00 00 1C 00 0F 00 02 00 FF FF 00 00 01 00 03 00 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,21925; reference:cve,2007-0030; classtype:attempted-user; sid:17543; rev:15;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel MalformedPalete Record Memory Corruption attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|00 00 80 00 FF 93 02 04 00 14 80 05 FF 92 00 E2 00 80 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,21922; reference:cve,2007-0031; classtype:attempted-user; sid:17542; rev:14;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel unspecified memory corruption attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|53 68 65 65 74 31 00 00 00 00 00 00 53 68 65 65 74 32 00 00|"; depth:20; offset:688; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,15926; classtype:attempted-user; sid:17538; rev:15;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Micrsoft Office Excel TXO and OBJ Records Parsing Stack Memory Corruption"; flow:to_client,established; flowbits:isset,file.xls; content:"]|00|"; content:"|15|"; distance:0; byte_test:2,>,30,2,relative,little; content:"|04 01 BF 00 08 00 08 00 81 01 09 00 00 08 83 01|"; content:"|4D 00 00 08 BF 01 10 00 10 00 C0 01 17 00 00 08|"; within:16; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,32618; reference:cve,2008-4265; classtype:attempted-user; sid:17532; rev:14;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel Malformed Record Code Execution attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|01 00 02 00|"; content:"|9C 00 02 00|"; within:4; distance:2; byte_test:2,>,0x20,0,relative,little; content:"|19 00 02 00|"; within:4; distance:2; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,17101; reference:cve,2006-0031; classtype:attempted-user; sid:17517; rev:18;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel malformed Graphic Code Execution"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|00 0D 10 38 00 00 00 18 01 61 00 61 00 61 00|"; fast_pattern:only; pcre:"/(\x51\x10..\x01(\x02|\x00)|\x01(\x02|\x00)..\x51\x10)/smi"; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,16181; reference:cve,2006-0030; classtype:attempted-user; sid:17511; rev:15;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word formatted disk pages table memory corruption attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|D0 CF 11 E0 A1 B1 1A E1|"; content:"|EC A5|"; within:2; distance:504; byte_test:4,>,0xFFFF,126,relative,little; content:"|00 00 00 00|"; within:4; distance:12; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,21589; reference:cve,2006-6561; classtype:attempted-user; sid:17506; rev:17;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office PowerPoint malformed NamedShows record code execution attempt"; flow:to_client,established; flowbits:isset,file.ppt; file_data; content:"|0F 00 10 04 1E 02 00 00 EB 0A 11 06 2E 02 00 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,20226; reference:cve,2006-4694; classtype:attempted-user; sid:17497; rev:17;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office PowerPoint malformed NamedShows record code execution attempt"; flow:to_client,established; flowbits:isset,file.ppt; file_data; content:"|0F 00 10 04 36 00 00 00 0F 00 11 05 2E 00 00 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,20226; reference:cve,2006-4694; classtype:attempted-user; sid:17496; rev:17;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel Malformed SELECTION Record Code Execution attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|1D 00 0F 00 03 00 00 00 00 00 00 FF FF FF FF FF FF 00 00 EF|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,18853; reference:cve,2006-1301; classtype:attempted-user; sid:17492; rev:14;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word mso.dll LsCreateLine memory corruption attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|41 41 41 41 41 41 41 41 09 09 09 09 09 09 0D 41 41 41 41 41 41 41 41 41 41 41 41 41 41 09 0D 41|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,18905; reference:cve,2006-3493; classtype:attempted-user; sid:17491; rev:17;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel Malformed Range Code Execution attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|18 02 1F|"; content:"|00 00 00 00|"; within:4; distance:8; byte_test:2,>,32767,-6,relative,little; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,15780; reference:cve,2005-4131; classtype:attempted-user; sid:17488; rev:19;) # alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft OLE automation string manipulation overflow attempt"; flow:to_client,established; file_data; content:"|2E|substringData"; pcre:"/\x2esubstringData\s*\x28[^\x2c]*\x2c\s*0x7(f|F){6}[6-9AaBbCcDdEeFf]/"; metadata:policy max-detect-ips drop, service http; reference:bugtraq,25282; reference:cve,2007-2224; classtype:attempted-user; sid:17421; rev:8;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word Converter XST structure buffer overflow attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|11 84 98 FE 5E 84 68 01 60 84 98 FE 4F 4A 06 00 51 4A 06 00 6F 28 00 87 68 00 00 00 00 88 48 00 00 42 43 00 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2008-4841; reference:url,technet.microsoft.com/en-us/security/bulletin/ms09-010; classtype:attempted-user; sid:17404; rev:13;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE OpenOffice RTF File parsing heap buffer overflow attempt"; flow:to_client,established; flowbits:isset,file.rtf; file_data; content:"rtf"; nocase; content:"|5C|prtdata"; distance:0; nocase; isdataat:200,relative; content:!"|0A|"; within:200; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,24450; reference:cve,2007-0245; classtype:attempted-user; sid:17403; rev:15;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Publisher Object Handler Validation Code Execution attempted"; flow:to_client,established; file_data; content:"|00 00 03 68 1A 01 00 00 34 00 00 00 01 20 01 00|"; content:"|01 20 1D 01 00 00 02 20 1C 01 00 00 03 90 5A 05 00 00 00 78 00 78|"; distance:0; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,29158; reference:cve,2008-0119; classtype:attempted-user; sid:17383; rev:12;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel Malformed Filter Records Handling Code Execution attempt"; flow:to_client,established; flowbits:isset,file.xls; content:"|43 6F 6C 75 6D 6E 20 42 3F 9B 00 00 00 9D 00 02 00 02 00 9E 00 1D 00 33 00 04 2A 06 02 8C 23 01 01 04 01 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,23780; reference:cve,2007-1214; classtype:attempted-user; sid:17377; rev:16;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word document stream handling code execution attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|A8 00 00 00 00 00 00 00 41 41 41 41 10 00 00 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,25567; reference:cve,2007-0870; classtype:attempted-user; sid:17368; rev:12;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel IMDATA buffer overflow attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|7F 00 54 01 09 00 01 00 00 00 00 00 0C 00 00 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,21856; reference:cve,2007-0027; classtype:attempted-user; sid:17362; rev:12;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office PowerPoint MCAtom remote code execution attempt"; flow:to_client,established; flowbits:isset,file.ppt; file_data; content:"|F8 0F 04 00 00 00|"; byte_test:4,>,2,0,relative,little; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,20495; reference:cve,2006-5296; classtype:attempted-user; sid:17318; rev:15;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE OpenOffice OLE file stream buffer overflow attempt"; flow:to_client,established; flowbits:isset,file.ole; file_data; content:"W|00|o|00|r|00|d|00|D|00|o|00|c|00|u|00|m|00|e|00|n|00|t|00|"; nocase; byte_test:4,>,0x80000000,96,relative,little; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,28819; reference:cve,2008-0320; classtype:attempted-user; sid:17315; rev:14;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office PowerPoint Viewer memory allocation code execution attempt"; flow:to_client,established; flowbits:isset,file.ppt; file_data; content:"|43 00 0B F0 26 00 00 00 7F 00 80 00 80 00 04 41 64 00 00 00 05 C1 0E 00 00 00 06 01 01 00 00 00 53|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,30552; reference:cve,2008-0120; classtype:attempted-user; sid:17310; rev:13;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word SmartTag record code execution attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|00 FF FF 01 00 00 00 05 00 4C 4F 0C 00 00 00 01 00 00 00 00 00 00 00 00 00 16 00 00 00 00 00 00 00 01 00 0E 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,30124; reference:cve,2008-2244; classtype:attempted-user; sid:17308; rev:14;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Works file converter file section header index table stack overflow attempt"; flow:to_client,established; flowbits:isset,file.works; file_data; content:"|22 07 00 00 00 22 22 22 22 00 22 06 00 00 00 02 00 46 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,27658; reference:cve,2008-0105; classtype:attempted-user; sid:17304; rev:11;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word TextBox sub-document memory corruption attempt"; flow:to_client,established; flowbits:isset,file.doc&file.ole; file_data; content:"|FF FF FF FF FF FF EC A5 C1 00 4D 20 09 04 00 00 F0 12 BF 00|"; fast_pattern:only; content:"|09 04 16 00 22 0C 00 00 80 57 00 00 80 57 00 00 02|"; content:"|00 00 00 00 00 00 00 00 FF FF 0F 00|"; within:12; distance:23; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,23380; reference:cve,2007-1910; classtype:attempted-user; sid:17301; rev:14;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office PowerPoint malformed data record code execution attempt"; flow:to_client,established; flowbits:isset,file.ppt; file_data; content:"|F2 03|"; content:"|AA AA AA 2F 00 C8 0F 0C 00 00 00 30 00 D2 0F 04 00|"; within:17; distance:1; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,20322; reference:cve,2006-3876; classtype:attempted-user; sid:17292; rev:15;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office PowerPoint PPT file parsing memory corruption attempt"; flow:to_client,established; flowbits:isset,file.ppt; file_data; content:"|A4 37 7A 00 81 00 00 00 00 00 82 00 00 00 00 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,18993; reference:cve,2006-3656; classtype:attempted-user; sid:17285; rev:15;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office malformed routing slip code execution attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"Routing|3A 20|"; content:"|B9 00 9B 05 56 04 3F 05 00 00 41 41 41 41|"; distance:0; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,17000; reference:cve,2006-0009; classtype:attempted-user; sid:17284; rev:14;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Windows Web View script injection attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|1E 00 00 00|"; fast_pattern; content:"javascript"; distance:0; nocase; pcre:"/\x1e\x00\x00\x00.{4}[^\x00]*?\x40[^\x00]*?javascript/i"; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,13248; reference:cve,2005-1191; classtype:attempted-user; sid:17271; rev:14;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Windows WordPad sprmTSetBrc SPRM overflow attempt"; flow:to_client,established; flowbits:isset,file.doc|file.xls; file_data; content:"|08 D6|"; byte_extract:1,2,NumberOfColumns,relative,little; content:"|20 D6 0B|"; distance:0; byte_extract:1,0,itcFirst,relative,little; byte_test:1,>,itcFirst,0,relative,little; byte_test:1,>,NumberOfColumns,0,relative,little; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,43122; reference:cve,2009-3302; reference:cve,2010-2563; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-067; classtype:attempted-user; sid:17250; rev:18;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel sheet name memory corruption attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|01 16 01 00 00 F0 00 00 00 2C 03 00 00 D4 00 00 00 00 02 00 00 FF FF FF FF 34 03 00 00 D8 03 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,24691; reference:cve,2007-3490; classtype:attempted-user; sid:17227; rev:15;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel pivot item index boundary corruption attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|D5 00 02 00|"; byte_extract:2,0,streamID,relative,little; content:"|B0 00|"; distance:0; content:"|00 00|"; within:2; distance:18; byte_extract:2,4,iCache,relative,little; content:"|C6 00|"; byte_test:2,=,streamID,6,relative,little; byte_test:2,!=,iCache,14,relative,little; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,42199; reference:cve,2010-2562; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-057; classtype:attempted-user; sid:17134; rev:21;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word HTML linked objects memory corruption attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|00 13 3A FF FF FF 8C 0F 00 00 F0 38 00 00 00 00 00 06 F0 18 00 00 00 02 08 00 00 02 00 00 00 01|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,42130; reference:cve,2010-1903; reference:url,technet.microsoft.com/en-us/security/bulletin/ms10-056; classtype:attempted-user; sid:17124; rev:15;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word rich text format invalid field size memory corruption attempt"; flow:to_client,established; flowbits:isset,file.rtf; file_data; content:"|5C|dpcallout"; nocase; content:"|5C|dppolycount"; within:50; nocase; byte_test:5,>,50,0,string,relative; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-1902; reference:url,technet.microsoft.com/en-us/security/bulletin/ms10-056; classtype:attempted-user; sid:17123; rev:18;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word rich text format unexpected field type memory corruption attempt 3"; flow:to_client,established; flowbits:isset,file.rtf; file_data; content:"|5C|datafield |5C|jpegblip"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-1901; reference:url,technet.microsoft.com/en-us/security/bulletin/ms10-056; classtype:attempted-user; sid:17122; rev:17;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word rich text format unexpected field type memory corruption attempt 2"; flow:to_client,established; flowbits:isset,file.rtf; file_data; content:"|5C|datafield |5C|pngblip"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-1901; reference:url,technet.microsoft.com/en-us/security/bulletin/ms10-056; classtype:attempted-user; sid:17121; rev:18;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word rich text format unexpected field type memory corruption attempt 1"; flow:to_client,established; flowbits:isset,file.rtf; file_data; content:"|5C|datafield |5C|emfblip"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-1901; reference:url,technet.microsoft.com/en-us/security/bulletin/ms10-056; classtype:attempted-user; sid:17120; rev:18;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word sprmCMajority SPRM overflow attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|01 08 5B 05 68 45 DE 11 13 6D 48 7B 07 7D 28 F0 6D 48 44 06 07|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-1900; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-056; classtype:attempted-user; sid:17119; rev:15;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Access ACCWIZ library release after free attempt - 2"; flow:to_client,established; file_data; content:"CLASSID|3D 22|CLSID|3A|53230327-172B-11D0-AD40-00A0C90DC8D9|22| data|3D|"; nocase; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-1881; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-044; classtype:attempted-user; sid:17039; rev:15;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Access ACCWIZ library release after free attempt - 1"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"O|00|b|00|j|00|e|00|c|00|t|00|P|00|o|00|o|00|l|00|"; content:"|18 00 01 01 FF FF FF FF FF FF FF FF 06 00 00 00 27 03 23 53 2B 17 D0 11 AD 40 00 A0 C9 0D C8 D9|"; distance:0; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-1881; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-044; classtype:attempted-user; sid:17038; rev:15;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Outlook AttachMethods local file execution attempt"; flow:established, to_server; content:"Content-Type|3A|"; nocase; content:"application/ms-tnef"; within:25; nocase; content:"aWxlOi8vYzpcd2luZG93"; distance:0; fast_pattern; metadata:policy max-detect-ips drop, service smtp; reference:cve,2010-0266; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-045; classtype:attempted-user; sid:17035; rev:13;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel FRTWrapper record buffer overflow attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|51 08 00 00|AAAAAAAAAAAAAAAA"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2008-3471; reference:url,technet.microsoft.com/en-us/security/bulletin/MS08-057; classtype:attempted-user; sid:16800; rev:17;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel DBQueryExt record memory corruption attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|DC 00 0C 00|"; byte_test:1,&,0x04,0,relative; byte_test:1,!&,0x03,0,relative; content:"|CD 00|"; within:2; distance:12; content:"|03 08|"; distance:0; content:"|03 08 00 00|"; within:4; distance:2; content:!"|04 00|"; within:2; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-1253; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-038; classtype:attempted-user; sid:16657; rev:17;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel BIFF5 ExternSheet record stack overflow attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|16 00 02 00|"; content:"|17 00|"; within:2; distance:2; byte_test:1,>,250,2,relative,little; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-1252; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-038; classtype:attempted-user; sid:16656; rev:18;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel Publisher record heap buffer overflow attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|88 00 08 00|"; content:"|01 00|"; within:2; distance:4; content:"|89 00|"; within:2; distance:2; byte_test:2,<,46,0,relative,little; metadata:policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-1250; reference:cve,2012-1886; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-038; reference:url,technet.microsoft.com/en-us/security/bulletin/MS12-076; classtype:attempted-user; sid:16654; rev:20;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel ExternName record stack buffer overflow attempt - 4"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|AE 01|"; byte_jump:2,0,relative,little; content:"|23 00|"; within:2; byte_test:2,>,250,0,relative,little; byte_test:2,<,8225,0,relative,little; byte_test:1,!&,0x01,0,relative; byte_test:1,&,0x01,7,relative; byte_test:1,&,0x08,7,relative; content:"|01 00|"; within:2; distance:12; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-1249; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-038; classtype:attempted-user; sid:16653; rev:17;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel ExternName record stack buffer overflow attempt - 3"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|AE 01|"; byte_jump:2,0,relative,little; content:"|23 00|"; within:2; byte_test:2,>,250,0,relative,little; byte_test:2,<,8225,0,relative,little; byte_test:1,!&,0x01,0,relative; byte_test:1,!&,0x01,7,relative; byte_test:1,&,0x08,7,relative; content:"|01|"; within:1; distance:12; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-1249; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-038; classtype:attempted-user; sid:16652; rev:17;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel ExternName record stack buffer overflow attempt - 2"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|AE 01|"; byte_jump:2,0,relative,little; content:"|23 00|"; within:2; byte_test:2,>,250,0,relative,little; byte_test:2,<,8225,0,relative,little; byte_test:1,!&,0x01,0,relative; byte_test:1,&,0x01,7,relative; byte_test:1,!&,0x08,7,relative; content:"|01 00|"; within:2; distance:10; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-1249; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-038; classtype:attempted-user; sid:16651; rev:17;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel ExternName record stack buffer overflow attempt - 1"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|AE 01|"; byte_jump:2,0,relative,little; content:"|23 00|"; within:2; byte_test:2,>,250,0,relative,little; byte_test:2,<,8225,0,relative,little; byte_test:1,!&,0x01,0,relative; byte_test:1,!&,0x01,7,relative; byte_test:1,!&,0x08,7,relative; content:"|01|"; within:1; distance:10; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-1249; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-038; classtype:attempted-user; sid:16650; rev:17;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel RealTimeData record heap memory corruption attempt - 1"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|13 08 E9 0B 0F 00 00 F0 E1 0B 00 00 00 00 06 F0 00 01 00 00 00 FF FF FF|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-1247; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-038; classtype:attempted-user; sid:16648; rev:15;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel RealTimeData record heap memory corruption attempt - 2"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|13 08|"; content:"|13 08 00 00 00 00 00 00 00 00 00 00|"; within:12; distance:2; pcre:"/^(.{3}[\x80-\xFF]|.{7}[\x80-\xFF])/sR"; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-1247; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-038; classtype:attempted-user; sid:16647; rev:16;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel RTD buffer overflow attempt "; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|13 08 E9 0B 0F 00 00 F0 E1 0B 00 00 00 00 06 F0 00 00 00 00 02 04 00 00 02 00 00 00 00 00 00 00 00 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-1246; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-038; classtype:attempted-user; sid:16646; rev:17;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel SxView record memory pointer corruption attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|B0 00 3D 00 02 00 08 00 00 00 01 00 04 00 04 00 01 00 FF 7F|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-1245; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-038; classtype:attempted-user; sid:16645; rev:15;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel WOpt record memory corruption attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|0B 08 3F 00 2C 00 3A 00 00 5F 28 22 24 22 2A 20 23 2C 23 23 1F 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-0824; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-038; classtype:attempted-user; sid:16644; rev:15;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel Chart Sheet Substream memory corruption attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|02 10 10 00|"; content:"|33 10 00 00|"; within:4; distance:16; content:"|54 08 0C 00 54 08 00 00|"; distance:0; content:"|55 08 0C 00|"; distance:8; content:"|55 08 0C 00|"; within:4; distance:12; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-0823; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-038; classtype:attempted-user; sid:16643; rev:15;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel OBJ record stack buffer overflow attempt - with macro and linkFmla"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|5D 00|"; content:"|15 00 12 00 14 00|"; within:6; distance:2; content:"|0C 00 14 00|"; within:4; distance:16; content:"|04 00|"; within:2; distance:20; byte_jump:2,0,relative,little; content:"|0E 00|"; within:2; byte_jump:2,0,relative,little; content:"|13 00|"; within:2; byte_test:2,>,0,0,relative,little; byte_jump:2,2,relative,little; byte_test:2,>,1024,14,relative,little; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-0822; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-038; classtype:attempted-user; sid:16641; rev:15;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel OBJ record stack buffer overflow attempt - with linkFmla"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|5D 00|"; content:"|15 00 12 00 14 00|"; within:6; distance:2; content:"|0C 00 14 00|"; within:4; distance:16; content:"|0E 00|"; within:2; distance:20; byte_jump:2,0,relative,little; content:"|13 00|"; within:2; byte_test:2,>,0,0,relative,little; byte_jump:2,2,relative,little; byte_test:2,>,1024,14,relative,little; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-0822; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-038; classtype:attempted-user; sid:16640; rev:15;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel OBJ record stack buffer overflow attempt - with macro"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|5D 00|"; content:"|15 00 12 00 14 00|"; within:6; distance:2; content:"|0C 00 14 00|"; within:4; distance:16; content:"|04 00|"; within:2; distance:20; byte_jump:2,0,relative,little; content:"|13 00|"; within:2; byte_test:2,>,0,0,relative,little; byte_jump:2,2,relative,little; byte_test:2,>,1024,14,relative,little; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-0822; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-038; classtype:attempted-user; sid:16639; rev:15;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel OBJ record stack buffer overflow attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|5D 00|"; content:"|15 00 12 00 14 00|"; within:6; distance:2; content:"|0C 00 14 00|"; within:4; distance:16; content:"|13 00|"; within:2; distance:20; byte_test:2,>,1024,18,relative,little; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,40520; reference:cve,2010-0822; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-038; classtype:attempted-user; sid:16638; rev:17;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft VBE6.dll stack corruption attempt"; flow:to_client,established; flowbits:isset,file.ppt; file_data; content:"|50 00 6F 00 69 00 6E 00 74 00 20 00 44 00 6F 00 63 00 75 00 6D 00|"; content:"|01 00 C3 0F 18 00 00 00|"; distance:0; content:"|00 00 00 00|"; within:4; distance:16; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,39931; reference:cve,2010-0815; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-031; classtype:attempted-user; sid:16593; rev:16;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Publisher 2007 and earlier stack buffer overflow attempt"; flow:to_client,established; flowbits:isset,file.pub; file_data; content:"|1D 00 00 04 01 00 01 00 FE 00 01 00 00 00 00 00 00 00 00 00 00 00 AE 02 00 00 C9 02 00 00 02 00 1D 00 04 04|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,39347; reference:cve,2010-0479; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-023; classtype:attempted-user; sid:16542; rev:20;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel DbOrParamQry.fWeb parsing remote code execution attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|DC 00 0C 00|"; byte_test:1,!&,0x07,0,relative,little; byte_test:1,&,0x48,0,relative,little; content:"|CD 00|"; within:2; distance:12; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-0264; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-017; classtype:attempted-user; sid:16471; rev:16;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel DbOrParamQry.fWeb parsing remote code execution attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|DC 00 0C 00|"; byte_test:1,&,0x03,0,relative,little; byte_test:1,&,0x40,0,relative,little; content:"|CD 00|"; within:2; distance:12; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-0264; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-017; classtype:attempted-user; sid:16470; rev:16;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel DbOrParamQry.fOdbcConn parsing remote code execution attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|DC 00 0C 00|"; byte_test:1,&,0x06,0,relative,little; byte_test:1,&,0x08,0,relative,little; content:!"|00 00|"; within:2; distance:10; content:"|CD 00|"; within:2; distance:12; content:!"|00 00|"; within:2; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-0264; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-017; classtype:attempted-user; sid:16469; rev:17;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel 2007 invalid comments.xml uninitialized pointer access attempt"; flow:to_client,established; file_data; content:"|87 0C 14 B9 C6 B7 BD BB 1A 78 3F 9F EE 0A 50 1C D1 B5 38 78 47 06 BE 88 E1 58 DF DE 41 41 41 41|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-0263; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-017; classtype:attempted-user; sid:16468; rev:16;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel 2007 invalid comments.xml uninitialized pointer access attempt"; flow:to_client,established; file_data; content:"|5A 73 6B C9 23 EF E2 40 41 3A 97 98 3C 66 81 E9 AA 79 48 84 1D 5B A2 EC 7B FD 5C 14 41 41 41 41|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-0263; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-017; classtype:attempted-user; sid:16467; rev:16;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel uninitialized stack variable code execution attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:">|02 12 00 B6 06 00 00 00 00|@|00 00 00 00 00 00 00 00 00 00 00 1D 00 0F 00 03 00 00 00 00 00 00 01 00 00 00 00 00 00 00 9A 00 06 00 FF FF 00 00 00 00 0A 00 00 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-0262; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-017; classtype:attempted-user; sid:16466; rev:15;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel ContinueFRT12 and MDXSet heap overflow attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|87 08|"; byte_jump:2,0,relative,little; content:"|7F 08|"; within:2; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-0261; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-017; classtype:attempted-user; sid:16465; rev:17;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel ContinueFRT12 heap overflow attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|86 08|"; byte_jump:2,0,relative,little; content:"|7F 08|"; within:2; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-0260; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-017; classtype:attempted-user; sid:16464; rev:17;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel BIFF5 formulas from records parsing code execution attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|3B FF FF 00 00 00 00 00 00 01 00 00 00 00 00 01 00 01 00 00 02|"; content:"|3B FF FF 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 02|"; within:21; distance:12; content:"|3B FF FF 00 00 00 00 00 00 01 00 00 00 00 00 02 00 02 00 00 02|"; within:21; distance:74; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-0258; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-017; classtype:attempted-user; sid:16463; rev:15;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel BIFF8 formulas from records parsing code execution attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|3B 00 00 01 00 01 00 00 00 02 00|"; content:"|3B 00 00 00 00 00 00 00 00 02 00|"; within:11; distance:12; content:"|3B 00 00 02 00 02 00 00 00 02 00|"; within:11; distance:92; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-0258; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-017; classtype:attempted-user; sid:16462; rev:15;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel EntExU2 write access violation attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|06 00|"; byte_test:2,!=,5,24,little,relative; byte_test:1,!=,1,26,little,relative; content:"|C2 01|"; within:100; byte_test:1,!&,8,8,little,relative; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,38547; reference:cve,2010-0257; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-017; classtype:attempted-user; sid:16461; rev:22;) # alert tcp $EXTERNAL_NET 119 -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Outlook Express and Windows Mail NNTP handling buffer overflow attempt"; flow:to_client,established; content:"1094795585 |0D 0A|1094795585 |0D 0A|"; fast_pattern:only; metadata:policy max-detect-ips drop, service nntp; reference:cve,2007-3897; reference:url,technet.microsoft.com/en-us/security/bulletin/MS07-056; classtype:attempted-user; sid:16428; rev:11;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office PowerPoint out of bounds value remote code execution attempt"; flow:to_client,established; flowbits:isset,file.ppt; file_data; content:"|C3 0B 00 02 00 00 FF 01 04 00 00 00 00 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-0032; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-004; classtype:attempted-user; sid:16421; rev:17;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel Malformed MSODrawing Record attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|EC 00|"; byte_test:2,>,0,0,relative; content:"|02 F0|"; within:2; distance:4; byte_test:4,>,0,0,relative; content:"|08 F0|"; within:2; distance:6; content:"|04 F0|"; within:2; distance:22; byte_test:4,>,0,0,relative; content:"|09 F0|"; within:2; distance:6; byte_test:4,>,0,0,relative; byte_test:4,=,0,-16,relative; content:!"|03 F0|"; within:2; distance:-18; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-0243; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-003; classtype:attempted-user; sid:16416; rev:17;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office PowerPoint invalid TextByteAtom remote code execution attempt"; flow:to_client,established; flowbits:isset,file.ppt; file_data; content:"|00 00 A8 0F|"; byte_test:1,&,0x80,3,relative,little; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-0033; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-004; classtype:attempted-user; sid:16412; rev:19;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office PowerPoint out of bounds value remote code execution attempt"; flow:to_client,established; flowbits:isset,file.ppt; file_data; content:"|00 00 C3 0B 08 00 00 00|"; byte_test:1,>,0,4,relative,little; byte_test:1,<,27,4,relative,little; byte_test:4,>,7,0,relative,little; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2010-0031; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-004; classtype:attempted-user; sid:16411; rev:15;) # alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"FILE-OFFICE Microsoft Office PowerPoint improper filename remote code execution attempt"; flow:to_server,established; content:".ppt"; nocase; http_uri; pcre:"/[^\x5C\x2F\x3A\x2A\x3F\x22\x3C\x3E\x7C\x3D\s]{200}\x2Eppt($|\x3f)/Ui"; metadata:policy max-detect-ips drop, service http; reference:cve,2010-0029; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-004; classtype:attempted-user; sid:16409; rev:14;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Visio invalid ho tag attempt"; flow:to_client,established; flowbits:isset,file.visio; file_data; content:"|00 02 0B|@|00 00 00 00 00 00 00 00 FE 00 FF 00 90 03 A7 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,33660; reference:cve,2009-0096; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-005; classtype:attempted-user; sid:16318; rev:15;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office PowerPoint bad text header txttype attempt"; flow:to_client,established; flowbits:isset,file.ppt; file_data; content:"|00 00 00 00 9F 0F 04 00 00 00|"; byte_test:1,>,8,0,relative,little; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2006-0022; reference:cve,2011-1269; reference:url,technet.microsoft.com/en-us/security/bulletin/MS06-028; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-036; classtype:attempted-user; sid:16188; rev:16;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel malformed file format parsing code execution attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|02 00 09 00 00 00 02 00 40 00 00 03 00 05 00 09 00 FF FF FF FF 41 15 00 01 00 05 00 09 00 01 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2006-0028; reference:url,technet.microsoft.com/en-us/security/bulletin/MS06-012; classtype:attempted-user; sid:16059; rev:17;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Outlook Web Access Cross-Site Scripting attempt"; flow:to_server,established; content:"javascript|3A|alert|28|'Attacker supplied script"; fast_pattern:only; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,13952; reference:cve,2005-0563; classtype:attempted-user; sid:15947; rev:11;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Publisher 2007 file format arbitrary code execution attempt"; flow:to_client,established; file_data; content:"R|00 12 12 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 13 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2009-0566; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-030; classtype:attempted-user; sid:15681; rev:14;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel Qsir and Qsif record remote code execution attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|06 08|"; content:"|06 08|"; within:2; distance:2; byte_test:1,&,0x10,16,relative; byte_test:1,!&,0x40,16,relative; byte_test:4,>,0,18,relative,little; content:"|07 08|"; distance:0; content:"|07 08 00 00|"; within:4; distance:2; byte_test:1,&,8,0,relative; byte_test:1,<,0x10,2,relative; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2009-1134; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-021; classtype:attempted-user; sid:15542; rev:16;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel SST record remote code execution attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"Sheet"; content:"|FC 00|"; distance:0; byte_test:4,>,0,2,relative,little; byte_test:4,>,0x10000000,6,relative,little; byte_test:2,>,10,0,relative,little; byte_test:2,<,8225,0,relative,little; byte_jump:2,0,relative,little; pcre:"/^(\xFF|\x3C)\x00/R"; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,36042; reference:cve,2009-0561; reference:cve,2009-3037; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-021; reference:url,www-01.ibm.com/support/docview.wss?uid=swg21396492; classtype:attempted-user; sid:15541; rev:19;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel Formula record remote code execution attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|06 00|"; byte_test:2,>,0,0,relative,little; byte_test:1,>,3,8,relative,little; content:"|FF FF|"; within:2; distance:14; byte_test:1,!&,41,0,relative,little; content:"|00|"; within:1; distance:1; byte_test:2,>,0,0,relative,little; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,35244; reference:cve,2009-0560; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-021; classtype:attempted-user; sid:15539; rev:18;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office PowerPoint CurrentUserAtom remote code execution attempt"; flow:to_client,established; flowbits:isset,file.ppt; file_data; content:"|00 00 F6 0F|"; content:"|14 00 00 00|"; within:4; distance:4; byte_test:2,>,255,8,relative,little; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2009-1131; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-017; classtype:attempted-user; sid:15506; rev:15;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office PowerPoint HashCode10Atom memory corruption attempt"; flow:to_client,established; flowbits:isset,file.ppt; file_data; content:"|0F 00 F0 03|"; content:"|00 00|+"; within:3; distance:5; isdataat:4,relative; content:!"|04 00 00 00|"; within:4; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2009-1130; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-017; classtype:attempted-user; sid:15505; rev:15;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office PowerPoint Download of version 4.0 file"; flow:to_client,established; flowbits:isset,file.ppt; file_data; content:"R|00|o|00|o|00|t|00| |00|E|00|n|00|t|00|r|00|y|00|"; content:"P|00|P|00|4|00|0|00|"; within:8; distance:108; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2009-0220; reference:cve,2009-0223; reference:cve,2009-0226; reference:cve,2009-0227; reference:cve,2009-1137; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-017; classtype:attempted-user; sid:15504; rev:17;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office PowerPoint LinkedSlide memory corruption"; flow:to_client,established; flowbits:isset,file.ppt; file_data; content:"|00 00 E7|.|08 00 00 00|"; byte_test:4, >, 1000000, 4, relative, little; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2009-0221; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-017; classtype:attempted-user; sid:15500; rev:17;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office PowerPoint PP7 Component buffer overflow attempt"; flow:to_client,established; flowbits:isset,file.ppt; file_data; content:"|CC 0F 00 00 FF FF 00 00|"; byte_test:4,>,0x100,0,relative,little; byte_extract:4,0,length,relative,little; content:"|00 00 00 00|"; within:4; content:"|BA 0F 00 00|"; within:length; byte_test:4,>,0x100,4,relative,little; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2009-1129; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-017; classtype:attempted-user; sid:15499; rev:18;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office WordPad and Office Text Converters PlcPcd aCP buffer overflow attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|02 10 00 00 00 00 00 00 00|"; byte_test:4,>,2147483648,0,relative,little; content:"|00 00 10|"; within:3; distance:5; content:"@|00 00 FF FF 01 00|"; within:8; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2009-0235; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-010; classtype:attempted-user; sid:15467; rev:17;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office WordPad WordPerfect 6.x converter buffer overflow attempt"; flow:to_client,established; file_data; content:"|1E 00 00 00 10 00 00 00|Nullcode.com.ar|00 03 00 00 00 01 00 00 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2009-0088; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-010; classtype:attempted-user; sid:15466; rev:13;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Outlook web access script injection attempt"; flow:to_server,established; content:"Content-Type|3A|"; nocase; content:"text/html"; distance:0; nocase; pcre:"/\x3c[^\x3e]*\x00[^\x3e]*\x3e/Rsmi"; metadata:policy max-detect-ips drop, service smtp; reference:bugtraq,18381; reference:cve,2006-1193; classtype:attempted-user; sid:15367; rev:12;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Visio Object Header Buffer Overflow attempt"; flow:to_client,established; file_data; content:"|10|@|DE|naaa|87|a|17|@|DE FD F2 F1 09|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2008-1089; classtype:attempted-user; sid:15163; rev:13;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word .rtf file stylesheet buffer overflow attempt"; flow:to_client,established; flowbits:isset,file.rtf; file_data; content:"|5C|stylesheet"; nocase; content:"|5C|stylesheet"; distance:0; nocase; content:"|5C|stylesheet"; distance:0; nocase; content:"|5C|stylesheet"; distance:0; nocase; content:"|5C|stylesheet"; distance:0; nocase; content:"|5C|stylesheet"; distance:0; nocase; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2008-4031; reference:url,technet.microsoft.com/en-us/security/bulletin/MS08-072; classtype:attempted-user; sid:15107; rev:19;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word .rtf file integer overflow attempt"; flow:to_client,established; flowbits:isset,file.rtf; file_data; content:"|5C|dppolycount"; nocase; byte_test:5,>,8186,0,relative,string,dec; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2008-4025; reference:url,technet.microsoft.com/en-us/security/bulletin/MS08-072; classtype:misc-attack; sid:15106; rev:18;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word rtf malformed dpcallout buffer overflow attempt"; flow:to_client,established; flowbits:isset,file.rtf; file_data; content:"|5C|dpcallout"; fast_pattern:only; pcre:"/\x5cdpcallout\s*\x5cdpcallout\s*\x5cdpcallout/smi"; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,32585; reference:cve,2008-4028; reference:url,technet.microsoft.com/en-us/security/bulletin/MS08-072; classtype:attempted-user; sid:15082; rev:18;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel file with embedded ActiveX control"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|00|_|00|_|00|S|00|R|00|P|00|_|00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2008-3477; reference:url,technet.microsoft.com/en-us/security/bulletin/MS08-057; classtype:attempted-user; sid:14642; rev:17;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel invalid FRTWrapper record buffer overflow attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"Sheet"; content:"|51 08|"; distance:0; fast_pattern; byte_test:2,<,8,0,relative,little; content:"|51 08|"; within:2; distance:2; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2008-3471; reference:url,technet.microsoft.com/en-us/security/bulletin/MS08-057; classtype:attempted-user; sid:14641; rev:21;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office OneNote iframe caller exploit attempt"; flow:to_client,established; file_data; content:"iframe"; nocase; content:"onenote|3A|"; distance:0; nocase; pcre:"/iframe[^\x3e]+onenote\x3a(\x2f|\x5c){2}[^\x3e]+(\x2fbackuppath|\x2fcachepath)/i"; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2008-3007; reference:url,technet.microsoft.com/en-us/security/bulletin/MS08-055; classtype:web-application-attack; sid:14262; rev:16;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel malformed chart arbitrary code execution attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|41 10 12 00|"; byte_test:2,>,1,0,relative,little; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2008-3004; reference:cve,2011-1987; reference:url,technet.microsoft.com/en-us/security/bulletin/MS08-043; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-072; classtype:attempted-user; sid:13981; rev:22;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel country record arbitrary code execution attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|8C 00 04 00|"; byte_test:2,>,5,0,relative,little; content:"|18 00|"; within:2; distance:4; byte_test:1,&,0x20,2,relative,little; byte_test:2,>,14,16,relative,little; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2008-3006; reference:cve,2008-4266; reference:url,technet.microsoft.com/en-us/security/bulletin/ms08-043; reference:url,technet.microsoft.com/en-us/security/bulletin/ms08-074; classtype:attempted-user; sid:13972; rev:23;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office PowerPoint TxMasterStyle10Atom atom numLevels buffer overflow attempt"; flow:to_client,established; flowbits:isset,file.ppt; file_data; content:"|0F 00 F8 03|"; byte_extract:4,4,master_record,relative,little; content:"|B2 0F|"; within:master_record; byte_test:2,>,5,4,relative,little; byte_test:1,<,0x90,-4,relative; byte_test:1,!&,0x01,-4,relative; byte_test:1,!&,0x02,-4,relative; byte_test:1,!&,0x04,-4,relative; byte_test:1,!&,0x08,-4,relative; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2008-1455; reference:url,technet.microsoft.com/en-us/security/bulletin/ms08-051; classtype:attempted-user; sid:13971; rev:19;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Visio DXF file invalid memory allocation exploit attempt"; flow:to_client,established; flowbits:isset,file.dxf; file_data; content:"|0D 0A|HATCH|0D 0A|"; nocase; pcre:!"/^\s*[1-9][0-9]*\x0d\x0a/R"; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2008-1090; reference:url,technet.microsoft.com/en-us/security/bulletin/MS08-019; classtype:attempted-user; sid:13665; rev:20;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Outlook arbitrary command line attempt"; flow:to_client,established; file_data; content:"mailto|3A|"; nocase; content:"|2F|importprf"; distance:0; nocase; pcre:"/\x3c[^\x3e]+[\x22\x27]mailto\x3a[^\x3e]+\x3f[^\x3e]*\x2fimportprf/smi"; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2008-0110; reference:url,technet.microsoft.com/en-us/security/bulletin/MS08-015; classtype:misc-attack; sid:13573; rev:20;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office PowerPoint malformed shapeid arbitrary code execution attempt"; flow:to_client,established; flowbits:isset,file.ppt; file_data; content:"|D0 CF 11 E0 A1 B1 1A E1|"; depth:8; content:"|0A F0 08 00 00 00|"; byte_test:2,&,1024,4,relative,little; byte_test:2,&,8,4,relative,little; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,28146; reference:cve,2008-0118; reference:url,technet.microsoft.com/en-us/security/bulletin/ms08-016; classtype:attempted-user; sid:13572; rev:22;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel dval record arbitrary code excecution attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|B2 01|"; byte_test:4,>,4294967293,16,relative,little; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2008-0111; reference:url,technet.microsoft.com/en-us/security/bulletin/MS08-014; classtype:attempted-user; sid:13571; rev:23;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel cf record arbitrary code excecution attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|B1 01|"; byte_test:2,&,1,12,relative,little; byte_test:2,>,69,14,relative,little; byte_test:2,>,13,0,relative,little; byte_test:2,<,8225,0,relative,little; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2008-0117; reference:url,technet.microsoft.com/en-us/security/bulletin/MS08-014; classtype:attempted-user; sid:13570; rev:21;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel macro validation arbitrary code execution attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|FF FF FF FF 09 08|"; content:"|00 00|"; within:2; distance:1; content:"|05 00|"; within:2; distance:1; pcre:"/\xff\xff\xff\xff\x09\x08[\x08\x10]\x00\x00[\x05\x06]\x05\x00[^\x85]*\xdf/sm"; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2008-0081; reference:url,technet.microsoft.com/en-us/security/bulletin/MS08-014; classtype:attempted-user; sid:13569; rev:15;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Works file converter field length invalid chunk size buffer overflow attempt"; flow:to_client,established; file_data; content:"CHNKWKS"; content:"|18 00|TEXT"; distance:0; isdataat:4,relative; content:!"|01 00|"; within:2; distance:2; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,27659; reference:cve,2008-0108; reference:url,technet.microsoft.com/en-us/security/bulletin/MS08-011; classtype:attempted-user; sid:13472; rev:16;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Publisher memory corruption attempt"; flow:to_client,established; flowbits:isset,file.pub; file_data; content:"|00 00 01 18 E8 AC 02 68 43 43 43 00 03 20 13 00|"; fast_pattern:only; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,27739; reference:cve,2008-0102; reference:url,technet.microsoft.com/en-us/security/bulletin/MS08-012; classtype:attempted-user; sid:13470; rev:21;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Works file converter file section length headers memory corruption attempt"; flow:to_client,established; flowbits:isset,file.works; file_data; content:"STSH"; byte_test:2,>,32768,0,relative,little; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,27657; reference:cve,2007-0216; reference:url,technet.microsoft.com/en-us/security/bulletin/ms08-011; classtype:attempted-user; sid:13466; rev:18;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel rtWnDesk record memory corruption exploit attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"8|00 04 00|"; byte_test:2,>,32767,0,relative,little; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2007-3890; reference:url,technet.microsoft.com/en-us/security/bulletin/ms07-044; classtype:attempted-user; sid:12284; rev:14;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel malformed FBI record buffer overflow attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|60 10 0A 00|"; byte_test:2,>,32767,8,relative,little; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,23826; reference:cve,2007-1203; reference:url,technet.microsoft.com/en-us/security/bulletin/ms07-023; classtype:attempted-user; sid:12256; rev:25;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel workbook workspace designation handling arbitrary code execution attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|FF FF FF FF FF FF FF FF 09 08|"; fast_pattern:only; pcre:"/\xff{8}\x09\x08[\x08\x10]\x00\x00[\x05\x06]\x00\x01/sm"; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,24803; reference:cve,2007-3030; reference:url,secunia.com/advisories/25995; reference:url,technet.microsoft.com/en-us/security/bulletin/MS07-036; classtype:attempted-user; sid:12184; rev:16;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel rtWindow1 record handling arbitrary code execution attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|FF FF FF FF FF FF FF FF 09 08|"; content:"|00 00|"; within:2; distance:1; content:"|05 00|"; within:2; distance:1; pcre:"/\x3d\x00\x12\x00..........(.[\x80-\xff]|...[\x80-\xff])/smiR"; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,22555; reference:cve,2007-3029; reference:url,secunia.com/advisories/25995; reference:url,technet.microsoft.com/en-us/security/bulletin/MS07-036; classtype:attempted-user; sid:12099; rev:14;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel malformed version field"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|09 08 10 00|"; fast_pattern:only; pcre:"/\x09\x08\x10\x00\x00[\x00\x01\x07-\xff]/sm"; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,24801; reference:cve,2007-1756; reference:url,technet.microsoft.com/en-us/security/bulletin/MS07-036; classtype:attempted-user; sid:12070; rev:16;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Visio version number anomaly"; flow:to_client,established; flowbits:isset,file.visio&file.ole; file_data; content:"Visio |28|TM|29| Drawing|0D 0A 00 00 00 00|"; fast_pattern:only; pcre:"/Visio \x28TM\x29 Drawing\r\n\x00{4}([^\x00]|\x00[^\x00]|\x00\x00[^\x0b]|\x00\x00\x0b[^\x00])/smi"; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,24349; reference:cve,2007-0934; reference:url,technet.microsoft.com/en-us/security/bulletin/MS07-030; classtype:misc-activity; sid:11836; rev:19;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel malformed named graph information ascii overflow attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|81 00 02 00|"; content:"|95 00|"; within:25; byte_test:2,>,313,0,relative,little; isdataat:314,relative; pcre:"/^(.{92}[^\x00]{41}|.{148}[^\x00]{41}|.{172}[^\x00]{41}|.{212}[^\x00]{41}|.{252}[^\x00]{22}|.{272}[^\x00]{22}|.{292}[^\x00]{22}|.{312}[^\x00]{22}|.{332}[^\x00]{22})/Rs"; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2007-0215; reference:url,technet.microsoft.com/en-us/security/bulletin/ms07-023; classtype:attempted-user; sid:11290; rev:20;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel Malformed Named Graph Information unicode overflow attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|81 00 02 00|"; content:"|95 00|"; within:25; isdataat:72,relative; content:!"|00 00|"; within:72; distance:3; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2007-0215; reference:url,technet.microsoft.com/en-us/security/bulletin/ms07-023; classtype:attempted-user; sid:11258; rev:24;) # alert tcp $EXTERNAL_NET 119 -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Outlook Express NNTP response overflow attempt"; flow:to_client,established; content:"215 "; depth:4; content:"|0D|"; distance:0; isdataat:50; content:!"|0D|"; within:50; metadata:policy max-detect-ips drop, service nntp; reference:bugtraq,13951; reference:cve,2005-1213; reference:url,technet.microsoft.com/en-us/security/bulletin/ms05-030; classtype:attempted-user; sid:9431; rev:15;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel colinfo XF record overflow attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|55 00 02 00|"; content:!"|00 02 0E 00|"; within:4; distance:2; content:"|7D 00 0C 00 00 00|"; within:200; byte_test:2,>,256,0,relative,little; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2006-3875; reference:url,technet.microsoft.com/en-us/security/bulletin/ms06-059; classtype:attempted-user; sid:8448; rev:19;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office GIF image descriptor memory corruption attempt"; flow:to_client,established; file_data; content:"GIF8"; depth:4; content:"a"; within:1; distance:1; byte_test:1,&,0x80,4,relative; pcre:"/^(.{13}|.{19}|.{31}|.{55}|.{103}|.{199}|.{391}|.{775})\x2C.{5}([\xE0-\xFF]|.{2}[\xE0-\xFF])/sR"; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,18915; reference:bugtraq,22630; reference:cve,2006-0007; reference:cve,2007-1071; reference:url,technet.microsoft.com/en-us/security/bulletin/ms06-039; classtype:attempted-user; sid:8414; rev:16;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel FngGroupCount record overflow attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|0B 02|"; content:"|00 00 00 00|"; within:4; distance:2; content:"|9C 00 02 00|"; within:50; fast_pattern; byte_test:2,>,0x50,0,relative,little; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,18890; reference:cve,2006-1308; classtype:attempted-user; sid:7205; rev:17;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel object ftCmo overflow attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|5D 00|"; content:"|15 00 12 00|"; within:4; distance:2; byte_test:2,>,0x1E,0,relative,little; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,18886; reference:cve,2006-1306; reference:url,technet.microsoft.com/en-us/security/bulletin/ms06-037; classtype:attempted-user; sid:7204; rev:20;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word information string overflow attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|FE FF 00 00|"; content:"|E0 85 9F F2 F9 4F 68 10 AB 91 08 00 2B 27 B3 D9|"; within:16; distance:24; byte_jump:4,0,relative,little,post_offset -48; byte_extract:4,0,sectLength,relative,little; content:"|1E 00 00 00|"; within:sectLength; byte_test:4,>,2147483647,0,relative,little; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2006-1540; reference:url,technet.microsoft.com/en-us/security/bulletin/ms06-038; classtype:attempted-user; sid:7203; rev:18;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word document summary information string overflow attempt"; flow:to_client,established; flowbits:isset,file.doc; file_data; content:"|FE FF 00 00|"; content:"|02 D5 CD D5 9C 2E 1B 10 93 97 08 00 2B 2C F9 AE|"; within:16; distance:24; byte_jump:4,0,relative,little,post_offset -48; byte_extract:4,0,sectLength,relative,little; content:"|1E 00 00 00|"; within:sectLength; byte_test:4,>,2147483646,0,relative,little; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2006-1540; reference:url,technet.microsoft.com/en-us/security/bulletin/ms06-038; classtype:attempted-user; sid:7202; rev:16;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel MSO.DLL malformed string parsing single byte buffer over attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|00 00 00 00 00 00 1D 00 0F 00 03 00 00 00|"; isdataat:2,relative; content:!"|00|"; within:1; distance:2; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,17252; reference:cve,2006-1540; reference:url,technet.microsoft.com/en-us/security/bulletin/ms06-038; classtype:attempted-user; sid:7197; rev:17;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel object record overflow attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|5D 00|"; byte_test:2,>,8224,0,relative,little; content:"|15 00 12 00|"; within:4; distance:2; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,18886; reference:cve,2006-1306; reference:url,technet.microsoft.com/en-us/security/bulletin/ms06-037; classtype:attempted-user; sid:7048; rev:17;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel url unicode overflow attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"n|DB 7C D2|m|AE CF 11 96 B8|DEST|00 00|"; content:"FWS"; within:3; distance:8; content:"javascript|3A|"; distance:0; nocase; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,18583; reference:cve,2006-3014; reference:url,technet.microsoft.com/en-us/security/bulletin/ms06-069; classtype:attempted-user; sid:7025; rev:16;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel url unicode overflow attempt"; flow:to_client,established; flowbits:isset,file.xls; file_data; content:"|E0 C9 EA|y|F9 BA CE 11 8C 82 00 AA 00|K|A9 0B|"; byte_test:4,>,3628,0,relative,little; metadata:policy max-detect-ips drop, service ftp-data, service http, service imap, service pop3; reference:bugtraq,18422; reference:bugtraq,18500; reference:cve,2006-3059; reference:cve,2006-3086; reference:cve,2011-0104; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-021; reference:url,technet.microsoft.com/en-us/security/bulletin/ms06-037; classtype:attempted-user; sid:7002; rev:20;) # alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel OBJ record invalid cmo.ot exploit attempt"; flow:established,to_client; flowbits:isset,file.xls; content:"|00 00 02 1A 00 4B 00 00 00 11 F0 00 00 00 00 5D 00 4E 00 15 00 12 00 B3 00 02 00 11 60 00 00 00 00 0C 14 FF 00 00 00 00 00 07 00 02 00 02 00 08|"; fast_pattern:only; reference:cve,2011-0980; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-021; classtype:attempted-admin; sid:18641; rev:6;) # alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel malformed SupBook record attempt"; flow:established,to_client; flowbits:isset,file.xls; content:"|AE 01|"; byte_test:2,>,0x300,4,relative,little; byte_test:2,<,0x400,4,relative,little; metadata:policy max-detect-ips drop, service http; reference:cve,2011-0979; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-021; classtype:attempted-user; sid:18640; rev:8;) # alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel rtToolbarDef record integer overflow attempt"; flow:to_client,established; flowbits:isset,file.xls; content:"|09 08 10 00 00 06|"; content:"|A7 00|"; fast_pattern; byte_test:2,>,2056,3,relative,little; byte_test:2,&,0x12f,7,relative,little; byte_jump:2,0,relative,little; content:"|3C 00|"; within:2; metadata:service http; reference:cve,2011-0097; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-021; classtype:attempted-user; sid:18631; rev:10;) # alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel rtToolbarDef record integer overflow attempt"; flow:to_client,established; flowbits:isset,file.xls; content:"|09 08 08 00 00 05|"; fast_pattern:only; content:"|A7 00|"; byte_test:2,>,520,3,relative,little; byte_test:2,&,0x12f,7,relative,little; byte_jump:2,0,relative,little; content:"|3C 00|"; within:2; metadata:policy max-detect-ips drop, service http; reference:cve,2011-0097; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-021; classtype:attempted-user; sid:18630; rev:11;) # alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Excel malformed StartObject record arbitrary code execution attempt"; flow:to_client,established; flowbits:isset,file.xls; content:"T|08 0C 00|T|08 00 00|"; byte_test:1,&,0x80,5,relative; metadata:service http; reference:cve,2009-3134; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-067; classtype:attempted-admin; sid:16228; rev:8;) alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Download of PowerPoint 95 file"; flow:to_client,established; content:"|03 00 00 00 FF FF 00 00|"; content:"|00 00 00 00 E8 03 00 00 FF FF 00 00|"; within:12; distance:4; content:"|00 00 00 00 E9 03 00 00 04 00 00 00|"; within:12; distance:4; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service http; reference:url,technet.microsoft.com/en-us/security/bulletin/MS09-017; classtype:attempted-user; sid:15503; rev:6;) # alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Publisher invalid pathname overwrite attempt"; flow:established,to_client; flowbits:isset,file.pub; content:"C|00 3A 00 5C 00|D|00|O|00|C|00|U|00|M|00|E|00|~|00|1|00 5C 00|A|00|A|00|A|00|A|00|A|00|A|00|A|00|"; reference:cve,2008-0104; reference:url,technet.microsoft.com/en-us/security/bulletin/MS08-012; classtype:attempted-user; sid:13471; rev:13;) # alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Publisher column and row remote code execution attempt"; flow:established, to_client; flowbits:isset,file.pub; content:"|8C 00 00 00 00 00 10 AC 52 00 D1 D2 4C 00 FD FF 1A 00 1A 00|"; fast_pattern:only; metadata:service http; reference:cve,2010-2570; reference:url,technet.microsoft.com/en-us/security/bulletin/MS10-103; classtype:attempted-user; sid:18213; rev:9;) alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Word ActiveX object uninitialized memory access attempt"; flow:to_server,established; file_data; content:"|A4 11 D8 28 D3 E5 EC FD ED 1A 1E 59 E0 08 4C 03 03 1A 99 33 83 EC 54 3C 3E 64 B0 A4 28 96 C0 07|"; fast_pattern:only; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service smtp; reference:cve,2015-1770; reference:url,technet.microsoft.com/en-us/security/bulletin/ms15-059; classtype:attempted-user; sid:34744; rev:2;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word ActiveX object uninitialized memory access attempt"; flow:to_client,established; file_data; content:"|A4 11 D8 28 D3 E5 EC FD ED 1A 1E 59 E0 08 4C 03 03 1A 99 33 83 EC 54 3C 3E 64 B0 A4 28 96 C0 07|"; fast_pattern:only; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2015-1770; reference:url,technet.microsoft.com/en-us/security/bulletin/ms15-059; classtype:attempted-user; sid:34743; rev:2;) alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Word WordPerfect converter EnumFontFamProc use after free attempt"; flow:to_server,established; file_data; content:"|05 DC 05 0C 00 01 D0 D0 02 08 00 00 01 80 01 08 00 02 D0 D1 01 23 00 00 8A 02 54 00 F4 1A 5C 12|"; fast_pattern:only; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service smtp; reference:cve,2015-1760; reference:url,technet.microsoft.com/en-us/security/bulletin/ms15-059; classtype:attempted-user; sid:34740; rev:3;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word WordPerfect converter EnumFontFamProc use after free attempt"; flow:to_client,established; file_data; content:"|05 DC 05 0C 00 01 D0 D0 02 08 00 00 01 80 01 08 00 02 D0 D1 01 23 00 00 8A 02 54 00 F4 1A 5C 12|"; fast_pattern:only; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2015-1760; reference:url,technet.microsoft.com/en-us/security/bulletin/ms15-059; classtype:attempted-user; sid:34739; rev:3;) alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Word WordPerfect converter ForeignToRtf32 use after free attempt"; flow:to_server,established; file_data; content:"|23 60 09 28 23 14 00 E0 DD 08 17 00 83 01 3B 00 02 00 33 A3 F7 03 00 00 2E 04 00 00 17 00 DD 8C|"; fast_pattern:only; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service smtp; reference:cve,2015-1759; reference:url,technet.microsoft.com/en-us/security/bulletin/ms15-059; classtype:attempted-user; sid:34738; rev:3;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word WordPerfect converter ForeignToRtf32 use after free attempt"; flow:to_client,established; file_data; content:"|23 60 09 28 23 14 00 E0 DD 08 17 00 83 01 3B 00 02 00 33 A3 F7 03 00 00 2E 04 00 00 17 00 DD 8C|"; fast_pattern:only; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2015-1759; reference:url,technet.microsoft.com/en-us/security/bulletin/ms15-059; classtype:attempted-user; sid:34737; rev:3;) # alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Visio UML string object heap buffer overflow attempt"; flow:to_server,established; flowbits:isset,file.visio; file_data; content:"|00 00 00 FF FF FF FF|d|00|o|00|c|00|u|00|m|00|e|00|n|00|t|00|a|00|t|00|i|00|o|00|n"; fast_pattern:only; metadata:service smtp; reference:cve,2011-1979; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-060; classtype:attempted-user; sid:34975; rev:2;) # alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Visio UML string object heap buffer overflow attempt"; flow:to_client,established; flowbits:isset,file.visio; file_data; content:"|00 00 00 FF FF FF FF|d|00|o|00|c|00|u|00|m|00|e|00|n|00|t|00|a|00|t|00|i|00|o|00|n"; fast_pattern:only; metadata:service ftp-data, service http, service imap, service pop3; reference:cve,2011-1979; reference:url,technet.microsoft.com/en-us/security/bulletin/MS11-060; classtype:attempted-user; sid:34974; rev:2;) alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Word nested tblStylePr element use after free attempt"; flow:to_server,established; file_data; content:"|BA 37 6E 65 CE 88 EF 89 39 3B 43 BE B7 F7 9C AC 4A 5D 80 A3 11 2C 42 1D CF 34 CC 2F 9F E9 87 9B D8 74 FF A2 48 C7 3C D2|"; fast_pattern:only; metadata:policy balanced-ips drop, policy security-ips drop, service smtp; reference:cve,2014-4117; reference:url,technet.microsoft.com/en-us/security/bulletin/ms14-061; classtype:attempted-user; sid:35021; rev:2;) alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -> $HOME_NET any (msg:"FILE-OFFICE Microsoft Office Word nested tblStylePr element use after free attempt"; flow:to_client,established; file_data; content:"|BA 37 6E 65 CE 88 EF 89 39 3B 43 BE B7 F7 9C AC 4A 5D 80 A3 11 2C 42 1D CF 34 CC 2F 9F E9 87 9B D8 74 FF A2 48 C7 3C D2|"; fast_pattern:only; metadata:policy balanced-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2014-4117; reference:url,technet.microsoft.com/en-us/security/bulletin/ms14-061; classtype:attempted-user; sid:35020; rev:2;) alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"FILE-OFFICE Microsoft Office Word nested tblStylePr element use after free attempt"; flow:to_server,established; file_data; content:"