48d8b650e5
* [New Rule] Potential Buffer Overflow Attack * Added timestamp_override * Update privilege_escalation_potential_bufferoverflow_attack.toml * Update privilege_escalation_potential_bufferoverflow_attack.toml * Update rules/linux/privilege_escalation_potential_bufferoverflow_attack.toml * Update rules/linux/privilege_escalation_potential_bufferoverflow_attack.toml --------- Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com>
77 lines
2.2 KiB
TOML
77 lines
2.2 KiB
TOML
[metadata]
|
|
creation_date = "2023/12/11"
|
|
maturity = "production"
|
|
min_stack_comments = "New fields added: required_fields, related_integrations, setup"
|
|
min_stack_version = "8.3.0"
|
|
updated_date = "2023/12/11"
|
|
|
|
[rule]
|
|
author = ["Elastic"]
|
|
description = """
|
|
Detects potential buffer overflow attacks by querying the "Segfault Detected" pre-built rule signal index, through a
|
|
threshold rule, with a minimum number of 100 segfault alerts in a short timespan. A large amount of segfaults in a short
|
|
time interval could indicate application exploitation attempts.
|
|
"""
|
|
from = "now-9m"
|
|
index = [".alerts-security.*"]
|
|
language = "kuery"
|
|
license = "Elastic License v2"
|
|
name = "Potential Buffer Overflow Attack Detected"
|
|
risk_score = 21
|
|
rule_id = "b7c05aaf-78c2-4558-b069-87fa25973489"
|
|
setup = """
|
|
|
|
This rule leverages alert data from other prebuilt detection rules to function correctly.
|
|
|
|
### Dependent Elastic Detection Rule Enablement
|
|
As a higher-order rule (based on other detections), this rule also requires the following prerequisite Elastic detection rule to be installed and enabled:
|
|
- Segfault Detected (5c81fc9d-1eae-437f-ba07-268472967013)
|
|
|
|
"""
|
|
severity = "low"
|
|
tags = [
|
|
"Domain: Endpoint",
|
|
"OS: Linux",
|
|
"Use Case: Threat Detection",
|
|
"Tactic: Privilege Escalation",
|
|
"Tactic: Initial Access",
|
|
"Use Case: Vulnerability",
|
|
"Rule Type: Higher-Order Rule"
|
|
]
|
|
timestamp_override = "event.ingested"
|
|
type = "threshold"
|
|
query = '''
|
|
kibana.alert.rule.rule_id:5c81fc9d-1eae-437f-ba07-268472967013 and event.kind:signal
|
|
'''
|
|
|
|
[[rule.threat]]
|
|
framework = "MITRE ATT&CK"
|
|
|
|
[[rule.threat.technique]]
|
|
id = "T1068"
|
|
name = "Exploitation for Privilege Escalation"
|
|
reference = "https://attack.mitre.org/techniques/T1068/"
|
|
|
|
[rule.threat.tactic]
|
|
id = "TA0004"
|
|
name = "Privilege Escalation"
|
|
reference = "https://attack.mitre.org/tactics/TA0004/"
|
|
|
|
[[rule.threat]]
|
|
framework = "MITRE ATT&CK"
|
|
|
|
[[rule.threat.technique]]
|
|
id = "T1190"
|
|
name = "Exploit Public-Facing Application"
|
|
reference = "https://attack.mitre.org/techniques/T1190/"
|
|
|
|
[rule.threat.tactic]
|
|
id = "TA0001"
|
|
name = "Initial Access"
|
|
reference = "https://attack.mitre.org/tactics/TA0001/"
|
|
|
|
[rule.threshold]
|
|
field = ["event.kind", "host.id"]
|
|
value = 100
|
|
|