Snort mailing list archives

Sourcefire VRT Certified Snort Rules Update 2010-06-14


From: Research <research () sourcefire com>
Date: Mon, 14 Jun 2010 15:04:03 -0400 (EDT)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Sourcefire VRT Certified Snort Rules Update

Synopsis:
The Sourcefire VRT is aware of vulnerabilities affecting Apple and
Google products.

Details:
Apple Safari Remote Code Execution (CVE-2010-1939):
Apple Safari contains a programming error that may allow a remote
attacker to execute code on an affected system. The problem occurs when
the browser improperly handles a deleted window object.

A rule to detect attacks targeting this vulnerability is included in
this release and is identified with GID 1, SID 16666.

Google Chrome Security Restriction Bypass (CVE-2010-1663):
Google Chrome contains a programming error that may allow a remote
attacker to bypass security restrictions. The problem occurs in the
Google URL parsing library used by the browser.

Rules to detect attacks targeting this vulnerability are included in
this release and are identified with GID 1, SIDs 16667 and 16668.

For a complete list of new and modified rules please see:

http://www.snort.org/vrt/docs/ruleset_changelogs/changes-2010-06-14.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.6 (GNU/Linux)

iD8DBQFMFn0jQcQOxItLLaMRAo2dAJ0Rdae0RiCVQd5Pj+BTB7cg4055IACdG2D4
mKFCV2w32vDwE9rc57K+Mvs=
=Ycqw
-----END PGP SIGNATURE-----


------------------------------------------------------------------------------
ThinkGeek and WIRED's GeekDad team up for the Ultimate 
GeekDad Father's Day Giveaway. ONE MASSIVE PRIZE to the 
lucky parental unit.  See the prize list and enter to win: 
http://p.sf.net/sfu/thinkgeek-promo
_______________________________________________
Snort-sigs mailing list
Snort-sigs () lists sourceforge net
https://lists.sourceforge.net/lists/listinfo/snort-sigs


Current thread: