Snort mailing list archives

Sourcefire VRT Certified Snort Rules Update 2010-05-11


From: Research <research () sourcefire com>
Date: Tue, 11 May 2010 16:46:09 -0400 (EDT)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Sourcefire VRT Certified Snort Rules Update

Synopsis:
The Sourcefire VRT is aware of vulnerabilities affecting products from
Microsoft and Apple.

Details:
Microsoft Security Advisory MS10-030:
Microsoft Windows Mail contains a programming error that may allow a
remote attacker to execute code on a vulnerable system. Exploitation
can occur if the user connects to a malicious POP3 mail server.

A rule to detect attacks targeting this vulnerability is included in
this release and is identified with GID 3, SID 16593.

Microsoft Security Advisory MS10-030:
A vulnerability in the way that Microsoft Office handles ActiveX
controls may allow a remote attacker to execute code on an affected
system.

A rule to detect attacks targeting this vulnerability is included in
this release and is identified with GID 3, SID 16595.

Apple Safari Remote Code Execution Vulnerability:
Apple Safari incorrectly handles parent windows which may allow a
remote attacker to execute code on an affected system.

A rule to detect attacks targeting this vulnerability is included in
this release and is identified with GID 1, SID 16596.

For a complete list of new and modified rules please see:

http://www.snort.org/vrt/docs/ruleset_changelogs/changes-2010-05-11.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.6 (GNU/Linux)

iD8DBQFL6cIRQcQOxItLLaMRAkUQAKCNwRGyEzaLlOW85DUxzMlaeq62DQCfX8o2
/rAXSGgfIfotuZQ299VPFu0=
=hNgB
-----END PGP SIGNATURE-----


------------------------------------------------------------------------------

_______________________________________________
Snort-sigs mailing list
Snort-sigs () lists sourceforge net
https://lists.sourceforge.net/lists/listinfo/snort-sigs


Current thread: