Snort mailing list archives

Sourcefire VRT Certified Snort Rules Update 2011-02-15


From: Research <research () sourcefire com>
Date: Tue, 15 Feb 2011 17:08:28 -0500 (EST)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Sourcefire VRT Certified Snort Rules Update

Synopsis:
The Sourcefire VRT is aware of a vulnerability affecting Microsoft
Windows Server 2003.

Details:
Microsoft Windows Server 2003 AD Heap Overflow:
Microsoft Windows Server 2003 contains a programming error that may
allow a remote attacker to execute code on an affected system.

A rule to detect attacks targeting this vulnerability is included in
this release and is identified with GID 1, SID 18462.

The Sourcefire VRT has also added and modified multiple rules in the
blacklist, exploit, smtp, specific-threats and web-misc rule sets to
provide coverage for emerging threats from these technologies.

For a complete list of new and modified rules please see:

http://www.snort.org/vrt/docs/ruleset_changelogs/changes-2011-02-15.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFNWverQcQOxItLLaMRArJrAJwJmMKZa+5Dc8CGxCsdfeb2XPnb9QCZAX3x
oTlRg1CEYYnJOAGwCmrLvJA=
=QnkB
-----END PGP SIGNATURE-----


------------------------------------------------------------------------------
The ultimate all-in-one performance toolkit: Intel(R) Parallel Studio XE:
Pinpoint memory and threading errors before they happen.
Find and fix more than 250 security defects in the development cycle.
Locate bottlenecks in serial and parallel code that limit performance.
http://p.sf.net/sfu/intel-dev2devfeb
_______________________________________________
Snort-sigs mailing list
Snort-sigs () lists sourceforge net
https://lists.sourceforge.net/lists/listinfo/snort-sigs
http://www.snort.org


Current thread: