heroui logo

Potential Buffer Overflow Attack Detected

Elastic Detection Rules

View Source
Summary
The rule named "Potential Buffer Overflow Attack Detected" aims to identify potential buffer overflow attacks on Linux systems by monitoring a significant increase in segmentation fault (segfault) alerts. Specifically, this threshold rule triggers an alert when it detects 100 or more segfaults logged in a specified timeframe. Buffer overflow attacks exploit programming vulnerabilities allowing attackers to execute arbitrary code, often used for privilege escalation or gaining initial access to systems. The detection relies on querying the pre-built signal index for segfault alerts. This higher-order rule depends on the pre-existing detection rule "Segfault Detected" (ID: 5c81fc9d-1eae-437f-ba07-268472967013). Investigating alerts generated by this rule involves analyzing system logs, identifying patterns of segfault notifications, and assessing the potential exploitation techniques used by the adversaries based on the MITRE ATT&CK framework. It is specifically designed to correlate with tactics such as privilege escalation and initial access.
Categories
  • Endpoint
  • Linux
Data Sources
  • Logon Session
  • Application Log
  • Network Traffic
ATT&CK Techniques
  • T1068
  • T1190
Created: 2023-12-11