Snort mailing list archives
Sourcefire VRT Certified Snort Rules Update 2010-09-14
From: Research <research () sourcefire com>
Date: Tue, 14 Sep 2010 16:56:32 -0400 (EDT)
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Sourcefire VRT Certified Snort Rules Update Synopsis: The Sourcefire VRT is aware of vulnerabilities affecting Microsoft and Adobe products. Details: Microsoft Security Advisory MS10-061: The Microsoft Windows Print Spooler service contains a programming error that may allow a remote attacker to execute code on an affected system. Rules to detect attacks targeting this vulnerability is included in this release and are identified with GID 3, SIDs 17252 and 17253. Microsoft Security Advisory MS10-062: Microsoft Windows Media Player contains a programming error that may allow a remote attacker to execute code on an affected system. A rule to detect attacks targeting this vulnerability is included in this release and is identified with GID 3, SID 17242. Microsoft Security Advisory MS10-063: Microsoft Windows XP and Vista contain a programming error that may allow a remote attacker to execute code on an affected system via the use of specially crafted Uniscribe fonts. A rule to detect attacks targeting this vulnerability is included in this release and is identified with GID 3, SID 17256. Microsoft Security Advisory MS10-064: Microsoft Outlook contains a programming error that may allow a remote attacker to execute code on an affected system. A rule to detect attacks targeting this vulnerability is included in this release and is identified with GID 3, SID 17251. Microsoft Security Advisory MS10-065: Microsoft Internet Information Server (IIS) contains a programming error that may allow a remote attacker to execute code on an affected system. Rules to detect attacks targeting this vulnerability is included in this release and are identified with GID 3, SIDs 17254 and 17255. Microsoft Security Advisory MS10-067: Microsoft WordPad contains a programming error that may allow a remote attacker to execute code on an affected system. A rule to detect attacks targeting this vulnerability is included in this release and is identified with GID 3, SID 17250. Microsoft Security Advisory MS10-068: Microsoft LSASS contains a programming error that may allow a remote attacker to execute code on an affected system. A rule to detect attacks targeting this vulnerability is included in this release and is identified with GID 3, SID 17249. Adobe Security Bulletin APSA10-03: Adobe Flash Player contains a programming error that may allow a remote attacker to execute code on an affected system. A rule to detect attacks targeting this vulnerability is included in this release and is identified with GID 1, SID 17257. For a complete list of new and modified rules please see: http://www.snort.org/vrt/docs/ruleset_changelogs/changes-2010-09-14.html -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.6 (GNU/Linux) iD8DBQFMj93jQcQOxItLLaMRAsX5AJ4ianhgCCaZKbrfhUEuEi/cMuoeFwCcDiKW p4fjDNq8FdKNeXEK0WUXPqU= =SaB4 -----END PGP SIGNATURE----- ------------------------------------------------------------------------------ Start uncovering the many advantages of virtual appliances and start using them to simplify application deployment and accelerate your shift to cloud computing. http://p.sf.net/sfu/novell-sfdev2dev _______________________________________________ Snort-sigs mailing list Snort-sigs () lists sourceforge net https://lists.sourceforge.net/lists/listinfo/snort-sigs
Current thread:
- Sourcefire VRT Certified Snort Rules Update 2010-09-14 Research (Sep 15)
- Re: Sourcefire VRT Certified Snort Rules Update 2010-09-14 Bryan Arenal (Sep 15)
- Re: Sourcefire VRT Certified Snort Rules Update 2010-09-14 Nigel Houghton (Sep 15)
- Re: Sourcefire VRT Certified Snort Rules Update 2010-09-14 waldo kitty (Sep 15)
- Re: Sourcefire VRT Certified Snort Rules Update 2010-09-14 Bryan Arenal (Sep 15)