[Snort-sigs] Sourcefire VRT Certified Rules Update

Sourcefire VRT research at ...435...
Tue Nov 14 20:27:58 EST 2006


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Sourcefire VRT Certified Rules Update

Synopsis:
The Sourcefire VRT is aware of multiple vulnerabilities affecting
systems using the Microsoft Windows Operating System some of which
could allow an attacker to execute code or cause a Denial of Service
(DoS) on an affected system.


Details:
Microsoft Security Bulletin MS06-067:
Multiple vulnerabilities exist in the way that Microsoft Internet
Explorer handles ActiveX controls. It may be possible for a remote
attacker to execute code of their choosing on an affected system via
Internet Explorer.

Rules to detect attacks targeting these vulnerabilities are included in
this rule pack and are identified as sids 8741 through 8845.

A rule to detect attacks targeting this vulnerability was also released
on September 1st 2006 and is identified as sid 8053. Additionally, sid
7009 released on July 6, 2006 may also generate events indicating
possible exploit attempts relating to this vulnerability.

Microsoft Security Bulletin MS06-068:
Microsoft Agent fails to correctly process a malformed HTTP character
file (.ACF). Sucessful exploitation of this vulnerability may allow an
attacker to execute code of their choosing on an affected system.

Rules to detect attacks targeting this vulnerability are included in
this rule pack and are identified as sids 8846 through 8856.

Additionally, sid 4172 released on September 19, 2005 may also generate
events indicating possible exploit attempts relating to this
vulnerability.

Microsoft Security Bulletin MS06-069:
Macromedia Flash Player suffers from several vulnerabilities that may
allow an attacker to execute code of their choosing on an affected
system.

A rule to detect attacks targeting this vulnerability was released on
July 13, 2006 and is identified as sid 7025.

Microsoft Security Bulletin MS06-070:
The Microsoft Workstation Service is prone to a buffer overflow
vulnerability that may allow a remote attacker to execute code of their
choosing on an affected system.

Rules to detect attacks targeting this vulnerability are included in
this rule pack and are identified as sids 9027 through 9128.

Microsoft Security Bulletin MS06-071:
Microsoft systems using the XMLHTTP 4.0 ActiveX control may be prone to
a vulnerability that could allow a remote attacker to execute code of
their choosing on that host.

Rules to detect attacks targeting this vulnerability were released on
November 6, 2006 and are identified as sids 8727 and 8728.



For a complete list of new and modified rules please see:

http://www.snort.org/rules/docs/ruleset_changelogs/changes2006-11-14.ht
ml
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (Darwin)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org

iD8DBQFFWm0eMpm0ve0NhMcRAl8hAJ0ecZxzWEzyKAIZ5g2N+429eyljSgCgpX0r
Ow0DbbluBcRKjVTMCKyQ2os=
=/QBm
-----END PGP SIGNATURE-----




More information about the Snort-sigs mailing list