<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 5307/0 - False Positives? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/5307-0-false-positives/m-p/509823#M98674</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just a little clarification, it's the regex in the URI and 500+ characters in the entire request, not 500+ characters in the URI.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 22 Feb 2006 00:41:52 GMT</pubDate>
    <dc:creator>wsulym</dc:creator>
    <dc:date>2006-02-22T00:41:52Z</dc:date>
    <item>
      <title>5307/0 - False Positives?</title>
      <link>https://community.cisco.com/t5/network-security/5307-0-false-positives/m-p/509822#M98673</link>
      <description>&lt;P&gt;This softcart signature fired and I started investigating it.  The signature itself states that it's supposed to be the Regexp + 500 chars.  However, as I was browsing the site that generated the alerts, I was able to trigger this signature numerous times, however the URI never had even close to the +500 characters the description says is needed to fire this sig.  Following is an example of the details of the event from the sensor itself:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;evIdsAlert: eventId=1135897714516778088  vendor=Cisco  severity=high  &lt;/P&gt;&lt;P&gt;  originator:   &lt;/P&gt;&lt;P&gt;    hostId: 27-fw-dmz-c1  &lt;/P&gt;&lt;P&gt;    appName: sensorApp  &lt;/P&gt;&lt;P&gt;    appInstanceId: 346  &lt;/P&gt;&lt;P&gt;  time: February 21, 2006 5:52:11 PM UTC  offset=-360  timeZone=GMT-06:00  &lt;/P&gt;&lt;P&gt;  signature:   description=Mercantec Softcart Overflow  id=5307  version=S110  &lt;/P&gt;&lt;P&gt;    subsigId: 0  &lt;/P&gt;&lt;P&gt;    sigDetails: /cgi-bin/SoftCart.exe + 500 chars  &lt;/P&gt;&lt;P&gt;  interfaceGroup:   &lt;/P&gt;&lt;P&gt;  vlan: 0  &lt;/P&gt;&lt;P&gt;  participants:   &lt;/P&gt;&lt;P&gt;    attacker:   &lt;/P&gt;&lt;P&gt;      addr: 206.195.195.101  locality=NETCACHE_EXT_IP  &lt;/P&gt;&lt;P&gt;      port: 18929  &lt;/P&gt;&lt;P&gt;    target:   &lt;/P&gt;&lt;P&gt;      addr: 64.82.101.6  locality=ANY  &lt;/P&gt;&lt;P&gt;      port: 80  &lt;/P&gt;&lt;P&gt;  context:   &lt;/P&gt;&lt;P&gt;    fromAttacker: &lt;/P&gt;&lt;P&gt;000000  63 61 74 69 6F 6E 2F 76  6E 64 2E 6D 73 2D 70 6F  cation/vnd.ms-po&lt;/P&gt;&lt;P&gt;000010  77 65 72 70 6F 69 6E 74  2C 20 61 70 70 6C 69 63  werpoint, applic&lt;/P&gt;&lt;P&gt;000020  61 74 69 6F 6E 2F 6D 73  77 6F 72 64 2C 20 2A 2F  ation/msword, */&lt;/P&gt;&lt;P&gt;000030  2A 0D 0A 41 63 63 65 70  74 2D 45 6E 63 6F 64 69  *..Accept-Encodi&lt;/P&gt;&lt;P&gt;000040  6E 67 3A 20 67 7A 69 70  2C 20 64 65 66 6C 61 74  ng: gzip, deflat&lt;/P&gt;&lt;P&gt;000050  65 0D 0A 41 63 63 65 70  74 2D 4C 61 6E 67 75 61  e..Accept-Langua&lt;/P&gt;&lt;P&gt;000060  67 65 3A 20 65 6E 2D 75  73 0D 0A 52 65 66 65 72  ge: en-us..Refer&lt;/P&gt;&lt;P&gt;000070  65 72 3A 20 68 74 74 70  3A 2F 2F 77 77 77 2E 62  er: &lt;A class="jive-link-custom" href="http://www.b" target="_blank"&gt;http://www.b&lt;/A&gt;&lt;/P&gt;&lt;P&gt;000080  61 62 79 6C 6F 76 65 2E  63 6F 6D 2F 63 67 69 2D  abylove.com/cgi-&lt;/P&gt;&lt;P&gt;000090  62 69 6E 2F 53 6F 66 74  43 61 72 74 2E 65 78 65  bin/SoftCart.exe&lt;/P&gt;&lt;P&gt;0000A0  2F 73 63 73 74 6F 72 65  2F 73 69 74 65 70 61 67  /scstore/sitepag&lt;/P&gt;&lt;P&gt;0000B0  65 73 2F 65 76 65 6E 74  73 2E 68 74 6D 6C 3F 4C  es/events.html?L&lt;/P&gt;&lt;P&gt;0000C0  2B 73 63 73 74 6F 72 65  2B 6E 6A 6F 69 30 35 35  +scstore+njoi055&lt;/P&gt;&lt;P&gt;0000D0  33 2B 31 31 34 30 35 36  31 36 34 35 0D 0A 55 73  3+1140561645..Us&lt;/P&gt;&lt;P&gt;0000E0  65 72 2D 41 67 65 6E 74  3A 20 4D 6F 7A 69 6C 6C  er-Agent: Mozill&lt;/P&gt;&lt;P&gt;0000F0  61 2F 34 2E 30 20 28 63  6F 6D 70 61 74 69 62 6C  a/4.0 (compatibl&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  riskRatingValue: 60  &lt;/P&gt;&lt;P&gt;  interface: ge0_0  &lt;/P&gt;&lt;P&gt;  protocol: tcp  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Network Security Database entry for this signature is described as: This signature fires upon seeing an HTTP get request whos length is greater than 500 characters directed at /cgi-bin/softcart.exe.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any information would be appreciated, thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;-David&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 09:54:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/5307-0-false-positives/m-p/509822#M98673</guid>
      <dc:creator>j826430</dc:creator>
      <dc:date>2019-03-10T09:54:04Z</dc:date>
    </item>
    <item>
      <title>Re: 5307/0 - False Positives?</title>
      <link>https://community.cisco.com/t5/network-security/5307-0-false-positives/m-p/509823#M98674</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just a little clarification, it's the regex in the URI and 500+ characters in the entire request, not 500+ characters in the URI.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Feb 2006 00:41:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/5307-0-false-positives/m-p/509823#M98674</guid>
      <dc:creator>wsulym</dc:creator>
      <dc:date>2006-02-22T00:41:52Z</dc:date>
    </item>
  </channel>
</rss>

