Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Signature & CVE id for Pyloris

Posted on 2014-09-17
1
195 Views
Last Modified: 2014-10-04
https://cve.mitre.org/find/index.html   will give a CVE id for Slowloris
but not Pyloris.

Trendmicro 'approximated' that one of their IPS signature
“1003598 - Multiple HTTP Server Low Bandwidth Denial Of Service”
deals with both Slowloris & Pyloris.

I used the term 'approximated' because in Trend's signature database,
there is no equivalent CVE id for this signature while most of their
other signatures has a CVE id.

Q1:
Anyone know if Pyloris has a CVE id & what is the id?

Q2:
Does TippingPoint has a signature (or in HP's term, it's called
'Digital Vaccine') for Pyloris?   We found one for Slowloris but
not Pyloris

Q3:
As TrendMicro's host-based IPS (ie sit inside the servers) has
only one signature to deal with both Slowloris & Pyloris, can
I by the same token, reckon that TippingPoint's vaccine which
deal with Slowloris is likely to be able to deal with Pyloris by
tracking/blocking  "Low Bandwidth DoS" ?  Reason is we can't
locate any vaccine (or signature) in TippingPoint that specifically
deals with Pyloris.  TrendMicro must have run into the same
situation that they use only one signature for both threats.

I'm suspecting it's the behavior/characteristics of both
Pyloris & Slowloris not to take up much bandwidth that
they have a common signature for TrendMicro's IPS
0
Comment
Question by:sunhux
1 Comment
 
LVL 62

Accepted Solution

by:
gheist earned 500 total points
ID: 40328539
CVE records vulnerabilieties, not exploits.
You can write same in shell script if you want, not python.
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Port Forwarding on Juniper SSG 140 Firewall 13 88
Structural Sanitization 4 46
Extra security implementation for 2017 9 68
Windows Folder Permissions 9 91
Transferring data across the virtual world became simpler but protecting it is becoming a real security challenge.  How to approach cyber security  in today's business world!
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.
In an interesting question (https://www.experts-exchange.com/questions/29008360/) here at Experts Exchange, a member asked how to split a single image into multiple images. The primary usage for this is to place many photographs on a flatbed scanner…

839 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question