heroui logo

Buffer Overflow Attempts

Sigma Rules

View Source
Summary
This rule detects attempts to exploit buffer overflow vulnerabilities in Unix-based systems by monitoring logs for specific keywords associated with such attacks. The focus is primarily on the detection of suspicious activities that indicate a malicious attempt to execute arbitrary code via stack overflow attacks. By analyzing system log files, the rule identifies patterns and anomalies linked to user logins and service errors associated with buffer overflow exploits. The keywords used for detection include phrases typically found in attack scenarios, such as unusual FTP logins and error messages from the rpc.statd service, as well as the string 'AAAAAAAA...' which is a common payload to trigger buffer overflow vulnerabilities. This proactive monitoring is crucial for maintaining system integrity and preventing unauthorized privilege escalation on Linux environments.
Categories
  • Linux
  • Endpoint
Data Sources
  • Logon Session
  • Application Log
Created: 2017-03-01