heroui logo

Abnormally Large DNS Response

Elastic Detection Rules

View Source
Summary
This rule detects abnormally large DNS responses that could indicate exploitation attempts of a known overflow vulnerability in Windows DNS servers, specifically targeting the vulnerability identified as CVE-2020-1350, also known as SigRed. The exploitation can lead to Remote Code Execution (RCE) or Denial of Service (DoS) by crashing the server. Alerts are generated when DNS response sizes exceed 60k bytes, although legitimate traffic above this threshold may lead to false positives, particularly in environments with expected large DNS responses due to configurations or authorized scans. Analysts are advised to validate such responses by investigating traffic sources and reviewing additional logs and signatures. Proper patching and monitoring for unusual behavior are critical for remediation and prevention against ongoing threats associated with this vulnerability.
Categories
  • Network
  • Endpoint
  • Windows
Data Sources
  • Network Traffic
  • Application Log
ATT&CK Techniques
  • T1210
Created: 2020-07-16