[Snort-sigs] Sourcefire VRT Certified Snort Rules Update

Sourcefire VRT research at ...435...
Tue Jun 12 22:41:06 EDT 2007


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Sourcefire VRT Certified Snort Rules Update

Synopsis:
The Sourcefire VRT is aware of vulnerabilities affecting hosts using
Microsoft products.

Details:
Microsoft Security Bulletin MS07-033:
Microsoft Internet Explorer suffers from multiple problems which may
allow a remote attacker to execute code on an affected system.

COM Object Instantiation Memory Corruption Vulnerability
(CVE-2007-0218):
Multiple vulnerabilities exist in the way that Internet Explorer
handles ActiveX controls. It may be possible for an attacker to
instantiate COM objects on a vulnerable system by using an ActiveX
control.

Rules to detect attacks targeting this vulnerability were previously
released and are identified as SIDs 7904, 7905, 7928, 7929, 7934, 7935,
7938, 7939, 7942 through 7945 and SIDs 7958 and 7959.

Navigation Cancel Page Spoofing Vulnerability (CVE-2007-1752):
It may be possible for an attacker to display spoofed content in the
Navigation canceled information page in Internet Explorer. This may
allow the attacker to execute code on an affected system.

A rule to detect attacks targeting this vulnerability is included in
this release and is identified as SID 11834.

Speech Control Memory Corruption Vulnerability (CVE-2007-2222):
The Microsoft Speech API contains a programming error that may allow a
remote attacker to execute code on an affected system.

Rules to detect attacks targeting this vulnerability are included in
this release and are identified as SIDs 11826 through 11833.

Microsoft Security Bulletin MS07-034:
Microsoft Mail fails to correctly handle UNC navigation requests. An
attacker could utilize this vulnerability to execute code on an
affected system.

A rule to detect attacks targeting this vulnerability is included in
this release and is identified as SID 11837.

Microsoft Security Bulletin MS07-034:
Microsoft Visio fails to correctly validate the version number
contained in a document. An attacker can utilize this flaw to execute
code on an affected system.

A rule to detect attacks targeting this vulnerability is included in
this release and is identified as SID 11836.

For a complete list of new and modified rules please see:

http://www.snort.org/vrt/docs/ruleset_changelogs/changes-2007-06-12.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (Darwin)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFGb1lCoFlcG+k7cPwRAifOAJ9/3+YURbOUashWbcx1BUiO78fUNwCfYj5S
hZrzTdL4acWbDP4/N2PB9g8=
=ayz2
-----END PGP SIGNATURE-----




More information about the Snort-sigs mailing list