McAfee HISCDE-AB-IA Product Guide - Page 108

Windows class Files, Note 1

Page 108 highlights

Appendix A - Writing Custom Signatures and Exceptions Windows custom signatures Section level time user_name Executable dependencies caller module directives Values Notes 428 Optional. See Note 1. Path to a module (i.e. a DLL) loaded by an executable that makes a call that causes a buffer overflow bo:stack Examines memory location that is executing and detects if memory location is running from writable memory that is part of the current thread's stack. bo:heap Examines memory location that is executing and detects if memory location is running from writable memory that is part of a heap. bo:writeable_memory Examines memory location that is executing and detects if memory location is running from writable memory that is neither part of the current thread's stack or a heap. bo:invalid_call Checks that an API is called from a proper call instruction. bo:target_bytes A hexadecimal string representing 32 bytes of instructions that can be used to create a targeted exception for a false positive without disabling buffer overflow for the entire process. bo:call_not_found Checks that code sequence prior to return address is not a call. bo:call_return_unreadable Checks that return adress is not readable memory. bo:call_different_target_address Checks that call target does not match hooked target. bo:call_return_to_api checks that return address is API entry point. Note 1 Signature 428, Generic Buffer Overflow, is a generic buffer overflow rule. To avoid triggering this rule, include section "dependencies 428" in the custom signature. Windows class Files The following table lists the possible sections and values for the Windows class Files: Section Class Id level Values Files See Common sections. Notes 108 McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154

Notes
Values
Section
level
time
user_name
Executable
Optional. See Note 1.
428
dependencies
Path to a module (i.e. a DLL)
loaded by an executable that
caller module
makes a call that causes a buffer
overflow
Examines memory location that is executing and
detects if memory location is running from
bo:stack
directives
writable memory that is part of the current
thread's stack.
Examines memory location that is executing and
detects if memory location is running from
writable memory that is part of a heap.
bo:heap
Examines memory location that is executing and
detects if memory location is running from
bo:writeable_memory
writable memory that is neither part of the current
thread's stack or a heap.
Checks that an API is called from a proper call
instruction.
bo:invalid_call
A hexadecimal string representing 32 bytes of
instructions that can be used to create a targeted
bo:target_bytes
exception for a false positive without disabling
buffer overflow for the entire process.
Checks that code sequence prior to return address
is not a call.
bo:call_not_found
Checks that return adress is not readable memory.
bo:call_return_unreadable
Checks that call target does not match hooked
target.
bo:call_different_target_address
checks that return address is API entry point.
bo:call_return_to_api
Note 1
Signature 428, Generic Buffer Overflow, is a generic buffer overflow rule. To avoid triggering
this rule, include section "dependencies 428" in the custom signature.
Windows class Files
The following table lists the possible sections and values for the Windows class Files:
Notes
Values
Section
Files
Class
See
Common sections
.
Id
level
Appendix A — Writing Custom Signatures and Exceptions
Windows custom signatures
McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5
108