Snort mailing list archives
Sourcefire VRT Certified Snort Rules Update 2011-02-15
From: Research <research () sourcefire com>
Date: Tue, 15 Feb 2011 17:08:28 -0500 (EST)
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Sourcefire VRT Certified Snort Rules Update Synopsis: The Sourcefire VRT is aware of a vulnerability affecting Microsoft Windows Server 2003. Details: Microsoft Windows Server 2003 AD Heap Overflow: Microsoft Windows Server 2003 contains a programming error that may allow a remote attacker to execute code on an affected system. A rule to detect attacks targeting this vulnerability is included in this release and is identified with GID 1, SID 18462. The Sourcefire VRT has also added and modified multiple rules in the blacklist, exploit, smtp, specific-threats and web-misc rule sets to provide coverage for emerging threats from these technologies. For a complete list of new and modified rules please see: http://www.snort.org/vrt/docs/ruleset_changelogs/changes-2011-02-15.html -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux) iD8DBQFNWverQcQOxItLLaMRArJrAJwJmMKZa+5Dc8CGxCsdfeb2XPnb9QCZAX3x oTlRg1CEYYnJOAGwCmrLvJA= =QnkB -----END PGP SIGNATURE----- ------------------------------------------------------------------------------ The ultimate all-in-one performance toolkit: Intel(R) Parallel Studio XE: Pinpoint memory and threading errors before they happen. Find and fix more than 250 security defects in the development cycle. Locate bottlenecks in serial and parallel code that limit performance. http://p.sf.net/sfu/intel-dev2devfeb _______________________________________________ Snort-sigs mailing list Snort-sigs () lists sourceforge net https://lists.sourceforge.net/lists/listinfo/snort-sigs http://www.snort.org
Current thread:
- Sourcefire VRT Certified Snort Rules Update 2011-02-15 Research (Feb 15)