[Snort-sigs] Sourcefire VRT Certified Snort Rules Update 2010-02-09

Research research at ...435...
Tue Feb 9 15:10:45 EST 2010


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Sourcefire VRT Certified Snort Rules Update

Synopsis:
The Sourcefire VRT is aware of multiple vulnerabilities affecting
Microsoft products.

Details:
Microsoft Security Advisory (MS10-003):
Microsoft Office contains a programming error that may allow a remote
attacker to execute code on an affected system.

A rule to detect attacks targeting this vulnerability is included in
this release and is identified with GID 3, SID 16416.

Microsoft Security Advisory (MS10-004):
Microsoft PowerPoint contains multiple programming errors that may
allow a remote attacker to execute code on an affected system.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 3, SIDs 16409 through 16413
and 16421.

Microsoft Security Advisory (MS10-005):
Microsoft Paint contains a programming error that may allow a remote
attacker to execute code on an affected system via a malformed JPEG
file.

A rule to detect attacks targeting this vulnerability is included in
this release and is identified with GID 3, SID 16422.

Microsoft Security Advisory (MS10-006):
The Microsoft implementation of SMB contains a programming error that
may allow a remote attacker to execute code on an affected system.

A rule to detect attacks targeting this vulnerability is included in
this release and is identified with GID 3, SID 16417.

Microsoft Security Advisory (MS10-007):
The Microsoft Windows shell handler contains a programming error that
may allow a remote attacker to execute code on an affected system.

A rule to detect attacks targeting this vulnerability is included in
this release and is identified with GID 3, SID 16414.

Microsoft Security Advisory (MS10-008):
Microsoft Internet Explorer improperly handles certain ActiveX
controls, which may allow a remote attacker to execute code on an
affected system.

Rules to detect attacks targeting this vulnerability are included in
this release and are identified with GID 3, SIDs 16419 and 16420.

Microsoft Security Advisory (MS10-009):
The Microsoft TCP/IP implementation does not correctly process IPv6
traffic, which may allow a remote attacker to execute code on an
affected system.

A rule to detect attacks targeting this vulnerability is included in
this release and is identified with GID 3, SID 16405.

Microsoft Security Advisory (MS10-012):
The Microsoft implementation of SMB contains multiple programming
errors that may allow a remote attacker to execute code on an affected
system. In some circumstances a Denial of Service (DoS) may occur.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 3, SIDs 16395 through 16403.

Additionally, previously released rules may also generate events on
attacks targeting these vulnerabilities and are identified with GID 3,
SIDs 15009, 15124, 15453 and 15847.

Microsoft Security Advisory (MS10-013):
Microsoft DirectShow contains a programming error that may allow a
remote attacker to execute code on a vulnerable system.

A rule to detect attacks targeting this vulnerability is included in
this release and is identified with GID 3, SID 16415.

Microsoft Security Advisory (MS10-014):
Microsoft Active Directory contains a programming error that may allow
a remote attacker to cause a Denial of Service (DoS) against an
affected system.

A rule to detect attacks targeting this vulnerability is included in
this release and is identified with GID 3, SID 16394.

Microsoft Internet Explorer Zone Redirect (CVE-2010-0255):
Microsoft Internet Explorer fails to prevent the processing of non-HTML
documents as HTML text. A remote attacker may utilize this
vulnerability to view files on an affected system.

A rule to detect attacks targeting this vulnerability is included in
this release and is identified with GID 3, SID 16423.

For a complete list of new and modified rules please see:

http://www.snort.org/vrt/docs/ruleset_changelogs/changes-2010-02-09.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.6 (GNU/Linux)

iD8DBQFLcb2oQcQOxItLLaMRAvm3AJ99yX8fK1OkE4R/oIwyiWZE+BFUOACaAzq3
V3Jovji26qKn2nOmh5uJQCQ=
=tgo1
-----END PGP SIGNATURE-----





More information about the Snort-sigs mailing list