[Snort-sigs] Sourcefire VRT Certified Rules Update
research at ...435...
Tue Sep 19 14:43:50 EDT 2006
-----BEGIN PGP SIGNED MESSAGE-----
Sourcefire VRT Certified Rules Update
The Sourcefire VRT has learned of a vulnerability in the way that
Microsoft Windows systems process Pragmatic General Multicast (PGM)
Microsoft Security Bulletin MS06-052
When hosts using certain versions of the Microsoft Windows operating
system attempt to process PGM messages using the Microsoft Message
Queuing Service (MSMQ), the system may be exposed to a buffer overflow
condition. If the message contains more options than indicated in the
packet header, a static buffer may be overflowed allowing an attacker
to possibly execute code of their choosing on an affected host.
A shared object rule to detect attacks against this vulnerability is
included in this rule pack and is identified as gid 3 sid 8351.
8351 - BAD-TRAFFIC PGM nak list overflow attempt
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (Darwin)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org
-----END PGP SIGNATURE-----
More information about the Snort-sigs