[Snort-sigs] Sourcefire VRT Certified Rules Update

Sourcefire VRT research at ...435...
Tue Sep 19 14:43:50 EDT 2006


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Sourcefire VRT Certified Rules Update

Synopsis:
The Sourcefire VRT has learned of a vulnerability in the way that
Microsoft Windows systems process Pragmatic General Multicast (PGM)
traffic.


Details:
Microsoft Security Bulletin MS06-052
When hosts using certain versions of the Microsoft Windows operating
system attempt to process PGM messages using the Microsoft Message
Queuing Service (MSMQ), the system may be exposed to a buffer overflow
condition. If the message contains more options than indicated in the
packet header, a static buffer may be overflowed allowing an attacker
to possibly execute code of their choosing on an affected host.

A shared object rule to detect attacks against this vulnerability is
included in this rule pack and is identified as gid 3 sid 8351.


8351 - BAD-TRAFFIC PGM nak list overflow attempt
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (Darwin)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org

iD8DBQFFEDpmMpm0ve0NhMcRAmn2AJ9MOpA6PdoLC9eauTTTEY9OCzbnlgCeM333
TpDHCaBygcANZUevjxoRVgc=
=eqPT
-----END PGP SIGNATURE-----




More information about the Snort-sigs mailing list