Snort mailing list archives
Sourcefire VRT Certified Snort Rules Update 2010-05-11
From: Research <research () sourcefire com>
Date: Tue, 11 May 2010 16:46:09 -0400 (EDT)
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Sourcefire VRT Certified Snort Rules Update Synopsis: The Sourcefire VRT is aware of vulnerabilities affecting products from Microsoft and Apple. Details: Microsoft Security Advisory MS10-030: Microsoft Windows Mail contains a programming error that may allow a remote attacker to execute code on a vulnerable system. Exploitation can occur if the user connects to a malicious POP3 mail server. A rule to detect attacks targeting this vulnerability is included in this release and is identified with GID 3, SID 16593. Microsoft Security Advisory MS10-030: A vulnerability in the way that Microsoft Office handles ActiveX controls may allow a remote attacker to execute code on an affected system. A rule to detect attacks targeting this vulnerability is included in this release and is identified with GID 3, SID 16595. Apple Safari Remote Code Execution Vulnerability: Apple Safari incorrectly handles parent windows which may allow a remote attacker to execute code on an affected system. A rule to detect attacks targeting this vulnerability is included in this release and is identified with GID 1, SID 16596. For a complete list of new and modified rules please see: http://www.snort.org/vrt/docs/ruleset_changelogs/changes-2010-05-11.html -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.6 (GNU/Linux) iD8DBQFL6cIRQcQOxItLLaMRAkUQAKCNwRGyEzaLlOW85DUxzMlaeq62DQCfX8o2 /rAXSGgfIfotuZQ299VPFu0= =hNgB -----END PGP SIGNATURE----- ------------------------------------------------------------------------------ _______________________________________________ Snort-sigs mailing list Snort-sigs () lists sourceforge net https://lists.sourceforge.net/lists/listinfo/snort-sigs
Current thread:
- Sourcefire VRT Certified Snort Rules Update 2010-05-11 Research (May 11)