Snort mailing list archives
Sourcefire VRT Certified Snort Rules Update 2011-10-11
From: Research <research () sourcefire com>
Date: Tue, 11 Oct 2011 14:40:33 -0400 (EDT)
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Sourcefire VRT Certified Snort Rules Update Synopsis: The Sourcefire VRT is aware of vulnerabilities affecting products from Microsoft Corporation. Details: Microsoft Security Advisory MS11-075: The Microsoft Windows operating system contains a programming error that may allow a remote attacker to execute code on an affected system. Rules to detect attacks targeting this vulnerability are included in this release and are identified with GID 1, SIDs 20253 and 20254. Microsoft Security Advisory MS11-076: The Microsoft Windows Media Player contains a vulnerability that may allow a remote attacker to execute code on an affected system via the loading of a dynamic-link library from a remote location. Rules to detect attacks targeting this vulnerability are included in this release and are identified with GID 1, SIDs 18496 and 18497. Microsoft Security Advisory MS11-077: The Microsoft Windows operating system contains a vulnerability that may allow a remote attacker to execute code on an affected system. Rules to detect attacks targeting this vulnerability are included in this release and are identified with GID 1, SIDs 20261 and 20269. Microsoft Security Advisory MS11-078: Microsoft Silverlight contains a programming error that may allow a remote attacker to execute code on an affected system. A rule to detect attacks targeting this vulnerability is included in this release and is identified with GID 1, SID 20255. Microsoft Security Advisory MS11-079: Microsoft Forefront contains programming errors that may allow a remote attacker to execute code on an affected system. Rules to detect attacks targeting this vulnerability are included in this release and are identified with GID 1, SIDs 20256 through 20260 and 20272. Microsoft Security Advisory MS11-080: The Microsoft Windows operating system contains a programming error that may allow a remote attacker to execute code on an affected system. A rule to detect attacks targeting this vulnerability is included in this release and is identified with GID 1, SID 20270. Microsoft Security Advisory MS11-081: Microsoft Internet Explorer contains multiple vulnerabilities that may allow a remote attacker to execute code on an affected system. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with GID 1, SIDs 20262 through 20268 and 20273. Microsoft Security Advisory MS11-082: The Microsoft Host Integration Server contains a vulnerability that may allow a remote attacker to cause a Denial of Service (DoS) against a vulnerable host. A rule to detect attacks targeting this vulnerability is included in this release and is identified with GID 1, SID 20271. For a complete list of new and modified rules please see: http://www.snort.org/vrt/docs/ruleset_changelogs/changes-2011-10-11.html -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux) iD8DBQFOlI2haBoqZBVJfwMRAmTbAJ4sPolsVfVf9Jd/pLl8SiyGgePNOQCgiMyp 230Ezkai8anXT+Q1HI1kRww= =e3rw -----END PGP SIGNATURE----- ------------------------------------------------------------------------------ All the data continuously generated in your IT infrastructure contains a definitive record of customers, application performance, security threats, fraudulent activity and more. Splunk takes this data and makes sense of it. Business sense. IT sense. Common sense. http://p.sf.net/sfu/splunk-d2d-oct _______________________________________________ Snort-sigs mailing list Snort-sigs () lists sourceforge net https://lists.sourceforge.net/lists/listinfo/snort-sigs http://www.snort.org Please visit http://blog.snort.org for the latest news about Snort!
Current thread:
- Sourcefire VRT Certified Snort Rules Update 2011-10-11 Research (Oct 11)