Snort mailing list archives
Sourcefire VRT Certified Snort Rules Update 2010-12-09
From: Research <research () sourcefire com>
Date: Thu, 9 Dec 2010 14:51:20 -0500 (EST)
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Sourcefire VRT Certified Snort Rules Update Synopsis: The Sourcefire VRT is aware of a vulnerability affecting Internet Explorer. Details: Microsoft Internet Explorer Remote Code Execution: Microsoft Internet Explorer contains a programming error that may allow a remote attacker to execute code on an affected system. The problem occurs when the application attempts to reference memory after it has been freed. A rule to detect attacks targeting this vulnerability is included in this release and is identified with GID 1, SID 18196. Additionally the Sourcefire VRT has added and modified multiple rules in the netbios and specific-threats rule sets to provide coverage for emerging threats from these technologies. For a complete list of new and modified rules please see: http://www.snort.org/vrt/docs/ruleset_changelogs/changes-2010-12-09.html -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.6 (GNU/Linux) iD8DBQFNATM4QcQOxItLLaMRAi39AKCO6VeY82mAX68JWlQM15RJNRctXQCfUlCT TXnZJtuanQepw2eYDpWTs+U= =Tzu8 -----END PGP SIGNATURE----- ------------------------------------------------------------------------------ _______________________________________________ Snort-sigs mailing list Snort-sigs () lists sourceforge net https://lists.sourceforge.net/lists/listinfo/snort-sigs
Current thread:
- Sourcefire VRT Certified Snort Rules Update 2010-12-09 Research (Dec 09)