[Snort-sigs] Sourcefire VRT Certified Snort Rules Update

research at ...435... research at ...435...
Tue Mar 10 12:57:11 EDT 2009


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Sourcefire VRT Certified Snort Rules Update

Synopsis:
The Sourcefire VRT is aware of multiple vulnerabilities affecting
Microsoft Windows systems.

Details:
Microsoft Security Bulletin MS09-006:
A programming error in the Microsoft Windows kernel may allow a remote
attacker to execute code with system level privileges. This may be
exploited when specially crafted EMF files are viewed using Microsoft
Internet Explorer.

A rule to detect attacks targeting this vulnerability is included in
this release and is identified with GID 3, SID 15300.

Microsoft Security Bulletin MS09-008:
The DNS protocol as implemented in Microsoft Windows systems may allow
a remote attacker to spoof DNS traffic via cache poisoning techniques.

Rules to detect attacks targeting this vulnerability are included in
this release and are identified with GID 3, SIDs 15386 and 15387.

Additionally, a previously released rule will detect attacks targeting
this vulnerability and is identified with GID 1, SID 13948.

For a complete list of new and modified rules please see:

http://www.snort.org/vrt/docs/ruleset_changelogs/changes-2009-03-10.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFJtpEI8GAEVQeoGrMRAr0rAKDCnmvJ0FwuuSn9ohdML8Dm9x9vlQCfde1X
ExPISKkbUDwfbibgwldXMG0=
=X5tO
-----END PGP SIGNATURE-----




More information about the Snort-sigs mailing list