Snort mailing list archives
Sourcefire VRT Certified Snort Rules Update 2010-02-09
From: Research <research () sourcefire com>
Date: Tue, 9 Feb 2010 15:10:45 -0500 (EST)
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Sourcefire VRT Certified Snort Rules Update Synopsis: The Sourcefire VRT is aware of multiple vulnerabilities affecting Microsoft products. Details: Microsoft Security Advisory (MS10-003): Microsoft Office contains a programming error that may allow a remote attacker to execute code on an affected system. A rule to detect attacks targeting this vulnerability is included in this release and is identified with GID 3, SID 16416. Microsoft Security Advisory (MS10-004): Microsoft PowerPoint contains multiple programming errors that may allow a remote attacker to execute code on an affected system. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with GID 3, SIDs 16409 through 16413 and 16421. Microsoft Security Advisory (MS10-005): Microsoft Paint contains a programming error that may allow a remote attacker to execute code on an affected system via a malformed JPEG file. A rule to detect attacks targeting this vulnerability is included in this release and is identified with GID 3, SID 16422. Microsoft Security Advisory (MS10-006): The Microsoft implementation of SMB contains a programming error that may allow a remote attacker to execute code on an affected system. A rule to detect attacks targeting this vulnerability is included in this release and is identified with GID 3, SID 16417. Microsoft Security Advisory (MS10-007): The Microsoft Windows shell handler contains a programming error that may allow a remote attacker to execute code on an affected system. A rule to detect attacks targeting this vulnerability is included in this release and is identified with GID 3, SID 16414. Microsoft Security Advisory (MS10-008): Microsoft Internet Explorer improperly handles certain ActiveX controls, which may allow a remote attacker to execute code on an affected system. Rules to detect attacks targeting this vulnerability are included in this release and are identified with GID 3, SIDs 16419 and 16420. Microsoft Security Advisory (MS10-009): The Microsoft TCP/IP implementation does not correctly process IPv6 traffic, which may allow a remote attacker to execute code on an affected system. A rule to detect attacks targeting this vulnerability is included in this release and is identified with GID 3, SID 16405. Microsoft Security Advisory (MS10-012): The Microsoft implementation of SMB contains multiple programming errors that may allow a remote attacker to execute code on an affected system. In some circumstances a Denial of Service (DoS) may occur. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with GID 3, SIDs 16395 through 16403. Additionally, previously released rules may also generate events on attacks targeting these vulnerabilities and are identified with GID 3, SIDs 15009, 15124, 15453 and 15847. Microsoft Security Advisory (MS10-013): Microsoft DirectShow contains a programming error that may allow a remote attacker to execute code on a vulnerable system. A rule to detect attacks targeting this vulnerability is included in this release and is identified with GID 3, SID 16415. Microsoft Security Advisory (MS10-014): Microsoft Active Directory contains a programming error that may allow a remote attacker to cause a Denial of Service (DoS) against an affected system. A rule to detect attacks targeting this vulnerability is included in this release and is identified with GID 3, SID 16394. Microsoft Internet Explorer Zone Redirect (CVE-2010-0255): Microsoft Internet Explorer fails to prevent the processing of non-HTML documents as HTML text. A remote attacker may utilize this vulnerability to view files on an affected system. A rule to detect attacks targeting this vulnerability is included in this release and is identified with GID 3, SID 16423. For a complete list of new and modified rules please see: http://www.snort.org/vrt/docs/ruleset_changelogs/changes-2010-02-09.html -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.6 (GNU/Linux) iD8DBQFLcb2oQcQOxItLLaMRAvm3AJ99yX8fK1OkE4R/oIwyiWZE+BFUOACaAzq3 V3Jovji26qKn2nOmh5uJQCQ= =tgo1 -----END PGP SIGNATURE----- ------------------------------------------------------------------------------ SOLARIS 10 is the OS for Data Centers - provides features such as DTrace, Predictive Self Healing and Award Winning ZFS. Get Solaris 10 NOW http://p.sf.net/sfu/solaris-dev2dev _______________________________________________ Snort-sigs mailing list Snort-sigs () lists sourceforge net https://lists.sourceforge.net/lists/listinfo/snort-sigs
Current thread:
- Sourcefire VRT Certified Snort Rules Update 2010-02-09 Research (Feb 09)