Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add Sigma rule for CVE-2024-38063 IPv6 memory corruption detection #4988

Draft
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

zenzue
Copy link

@zenzue zenzue commented Aug 28, 2024

add rule for contribute

Summary of the Pull Request

This pull request introduces a new Sigma rule designed to detect exploitation attempts associated with CVE-2024-38063. The rule identifies specific network traffic patterns that may indicate an attempt to exploit memory corruption vulnerabilities in systems using IPv6.

Changelog

new: CVE-2024-38063_ipv6_memory_corruption_detection.yml - Adds a rule for detecting suspicious IPv6 packet patterns that may indicate exploitation of CVE-2024-38063.

Example Log Event

{
    "protocol": "IPv6",
    "events": {
        "FragmentationEvent": true,
        "AnomalousIPv6OptionHeaderEvent": true
    },
    "packet_length": "1337",
    "src_ip": "2001:db8::1",
    "dst_ip": "2001:db8::2",
    "info": "Detected packet with potentially malicious fragmentation and option headers"
}

Fixed Issues

https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/cve-2024-38063-disabling-ipv6-binding-fix-or-not/td-p/4220374

SigmaHQ Rule Creation Conventions

  • If your PR adds new rules, please consider following and applying these conventions

add rule for contribute
Copy link
Contributor

@github-actions github-actions bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Welcome @zenzue 👋

It looks like this is your first pull request on the Sigma rules repository!

Please make sure to read the SigmaHQ conventions document to make sure your contribution is adhering to best practices and has all the necessary elements in place for a successful approval.

Thanks again, and welcome to the Sigma community! 😃

@nasbench nasbench added the Work In Progress Some changes are needed label Aug 28, 2024
@nasbench nasbench self-assigned this Aug 28, 2024
@nasbench nasbench self-requested a review August 28, 2024 20:30
Comment on lines +12 to +13
category: network_traffic
product: network_monitoring
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Which product is this?

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

ah sorry 4 my bad
i got it from trend_micro_xdr
but can work with other network monitoring products
that why i do not add as

logsource:
    category: network_traffic
    product: trend_micro_xdr

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can you give me another example from another product. Else this would be a specific rule to trend micro XDR with its own specific field.

Because for this rule to be used, the fields needs to be mapped based on the logsource and then converted using a backend.

Aren't the name of the events unique to TrendMicro convention

I need at least 1 other product that has this coverage for this rule to make sense for "everybody else".

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@zenzue ping

@nasbench nasbench added the Author Input Required changes the require information from original author of the rules label Aug 29, 2024
@nasbench nasbench marked this pull request as draft August 29, 2024 20:50
@zenzue
Copy link
Author

zenzue commented Sep 23, 2024 via email

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Author Input Required changes the require information from original author of the rules Emerging-Threats Rules Work In Progress Some changes are needed
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants