[Snort-sigs] Sourcefire VRT Certified Snort Rules Update 2010-12-09

Research research at ...435...
Thu Dec 9 14:51:20 EST 2010


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Sourcefire VRT Certified Snort Rules Update

Synopsis:
The Sourcefire VRT is aware of a vulnerability affecting Internet
Explorer.

Details:
Microsoft Internet Explorer Remote Code Execution:
Microsoft Internet Explorer contains a programming error that may allow
a remote attacker to execute code on an affected system. The problem
occurs when the application attempts to reference memory after it has
been freed.

A rule to detect attacks targeting this vulnerability is included in
this release and is identified with GID 1, SID 18196.

Additionally the Sourcefire VRT has added and modified multiple rules
in the netbios and specific-threats  rule sets to provide coverage for
emerging threats from these technologies.

For a complete list of new and modified rules please see:

http://www.snort.org/vrt/docs/ruleset_changelogs/changes-2010-12-09.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.6 (GNU/Linux)

iD8DBQFNATM4QcQOxItLLaMRAi39AKCO6VeY82mAX68JWlQM15RJNRctXQCfUlCT
TXnZJtuanQepw2eYDpWTs+U=
=Tzu8
-----END PGP SIGNATURE-----





More information about the Snort-sigs mailing list