Skip to content

Commit

Permalink
Merge pull request #2178 from splunk/TR1807fix
Browse files Browse the repository at this point in the history
Removing false positives
  • Loading branch information
josehelps committed Apr 27, 2022
2 parents 106e451 + 2856666 commit ab74318
Showing 1 changed file with 2 additions and 2 deletions.
Original file line number Diff line number Diff line change
@@ -1,12 +1,12 @@
name: Splunk DoS via Malformed S2S Request
id: fc246e56-953b-40c1-8634-868f9e474cbd
version: 1
version: 2
date: '2022-03-24'
author: Lou Stella, Splunk
type: TTP
datamodel: []
description: On March 24th, 2022, Splunk published a security advisory for a possible Denial of Service stemming from the lack of validation in a specific key-value field in the Splunk-to-Splunk (S2S) protocol. This detection will alert on attempted exploitation in patched versions of Splunk.
search: '`splunkd` log_level=ERROR component=TcpInputProc thread_name=FwdDataReceiverThread | table host, src | `splunk_dos_via_malformed_s2s_request_filter`'
search: '`splunkd` log_level="ERROR" component="TcpInputProc" thread_name="FwdDataReceiverThread" "Invalid _meta atom" | table host, src | `splunk_dos_via_malformed_s2s_request_filter`'
how_to_implement: This detection does not require you to ingest any new data. The detection does require the ability to search the _internal index. This detection will only find attempted exploitation on versions of Splunk already patched for CVE-2021-3422.
known_false_positives: None.
references:
Expand Down

0 comments on commit ab74318

Please sign in to comment.