VRT Advisories

1 2 97 98 99 101 103 104 105 131 132


VRT Rules 2008-02-26

Sourcefire VRT Rules Update

Date: 2008-02-26

Synopsis:

The Sourcefire VRT is aware of vulnerabilities affecting Apple QuickTime and Citrix MetaFrame.

Details:

Apple QuickTime Buffer Overflow (CVE-2008-0033):
Apple QuickTime contains a buffer overflow condition that may allow a remote attacker to execute code on a vulnerable system. The problem occurs when QuickTime attempts to process malformed movie files that contain an invalid Image Descriptor atom size.

A rule to detect attacks targeting this vulnerability is included in this release and is identified as SID 13517.

Apple QuickTime Buffer Overflow (CVE-2008-0234):
Apple QuickTime contains a buffer overflow condition that may allow a remote attacker to execute code on a vulnerable system. The problem occurs when QuickTime attempts to process a long Reason-Phrase response to an rtsp request.

A rule to detect attacks targeting this vulnerability is included in this release and is identified as SID 13516.

Citrix MetaFrame Buffer Overflow (CVE-2008-0356):
Citrix MetaFrame Presentation Server contains a buffer overflow condition that may allow a remote attacker to execute code on an affected system. The problem occurs when the service attempts to process TCP packets containing an invalid size value.

A rule to detect attacks targeting this vulnerability is included in this release and is identified as SID 13519.

Rule Pack Summary:

For a complete list of new and modified rules, click here.

Warning:

Sourcefire VRT rule packs often utilize enhancements made to Snort. Operators should upgrade to the latest revision or patch level for Snort to ensure these enhancements are available before using these rules.

About the VRT:

The Sourcefire VRT is a group of leading edge intrusion detection and prevention experts working to proactively discover, assess and respond to the latest trends in hacking activity, intrusion attempts and vulnerabilities. This team is also supported by the vast resources of the open source Snort community, making it the largest group dedicated to advances in the network security industry.

Posted by on Feb 26, 2008



VRT Rules 2008-02-20

Sourcefire VRT Rules Update

Date: 2008-02-20

Synopsis:

The Sourcefire VRT is aware of vulnerabilities affecting Adobe Acrobat, Adobe Acrobat Reader and Microsoft Active Directory.

Details:

Adobe Acrobat and Adobe Acrobat Reader (CVE-2008-0655):
Adobe Acrobat and Adobe Acrobat Reader are prone to multiple vulnerabilities that may allow a remote attacker to execute code on a vulnerable system.

Rules to detect attacks targeting these vulnerabilities are included in this release and are identified as SIDs 13477 and 13478.

Microsoft Security Bulletin (MS08-003):
A vulnerability in Active Directory may allow a remote attacker to cause a Denial of Service (DoS) condition on a vulnerable host.

A shared object rule to detect attacks targeting this vulnerability is included in this release and is identified with GID 3 and SID 13475.

Note:
The detection functionality in SID 13475 is only available when using Snort version 2.8.0.2. This rule will not work with prior versions of Snort.

Rule Pack Summary:

For a complete list of new and modified rules, click here.

Warning:

Sourcefire VRT rule packs often utilize enhancements made to Snort. Operators should upgrade to the latest revision or patch level for Snort to ensure these enhancements are available before using these rules.

About the VRT:

The Sourcefire VRT is a group of leading edge intrusion detection and prevention experts working to proactively discover, assess and respond to the latest trends in hacking activity, intrusion attempts and vulnerabilities. This team is also supported by the vast resources of the open source Snort community, making it the largest group dedicated to advances in the network security industry.

Posted by on Feb 20, 2008



VRT Rules 2008-02-12

Sourcefire VRT Rules Update

Date: 2008-02-12

Synopsis:

The Sourcefire VRT is aware of multiple vulnerabilities affecting hosts using the Microsoft Windows operating system.

Details:

Microsoft Security Bulletin (MS08-004):
Hosts using the Microsoft Windows operating system may be vulnerable to a Denial of Service (DoS) attack. The problem lies in the processing of DHCP requests provided to a host system by a server.

A shared object rule to detect attacks targeting this vulnerability is included in this release and is identified with GID 3 and SID 13450.

Microsoft Security Bulletin (MS08-008):
A vulnerability in OLE Automation may present an attacker with the opportunity to execute code on an affected system via a specially crafted web page.

Rules to detect attacks targeting this vulnerability are included in this release and are identified with GID 3 and SIDs 13457 through 13460 and SID 13474.

Microsoft Security Bulletin (MS08-009):
Microsoft Word contains a vulnerability that may allow an attacker to execute code on an affected host.

A shared object rule to detect attacks targeting this vulnerability is included in this release and is identified with GID 3 and SID 13469.

Microsoft Security Bulletin (MS08-010):
Microsoft Internet Explorer contains a number of memory corruption vulnerabilities that may allow a remote attacker to execute code on an affected system.

Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with GID 3 and SIDs 13451 through 13456.

Microsoft Security Bulletin (MS08-011):
Microsoft Works File Converter contains vulnerabilities that may allow an attacker to execute code on an affected system via a specially crafted Works file.

Rules to detect attacks targeting this vulnerability are included in this release and are identified with GID 3 and SIDs 13466 and 13472.

Microsoft Security Bulletin (MS08-012):
Microsoft Publisher contains two vulnerabilities that may allow a remote attacker to execute code on an affected system via specially crafted Publisher files.

Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with GID 3 and SIDs 13470 and 13471.

Rule Pack Summary:

For a complete list of new and modified rules, click here.

Warning:

Sourcefire VRT rule packs often utilize enhancements made to Snort. Operators should upgrade to the latest revision or patch level for Snort to ensure these enhancements are available before using these rules.

About the VRT:

The Sourcefire VRT is a group of leading edge intrusion detection and prevention experts working to proactively discover, assess and respond to the latest trends in hacking activity, intrusion attempts and vulnerabilities. This team is also supported by the vast resources of the open source Snort community, making it the largest group dedicated to advances in the network security industry.

Posted by on Feb 12, 2008



VRT Rules 2008-02-05

Sourcefire VRT Rules Update

Date: 2008-02-05

Synopsis:

The Sourcefire VRT is aware of multiple vulnerabilities affecting ActiveX controls and has expanded coverage for CVE-2007-2446.

Details:

Samba Buffer Overflow (CVE-2007-2446):
Samba is prone to multiple buffer overflow conditions that may allow a remote attacker to execute code on a vulnerable host.

Rules to detect attacks targeting these vulnerabilities are included in this release and are identified as SIDs 13367 through 13414.

Additional rules are included in this release to detect attacks targeting ActiveX controls from SwiftView and Facebook Photo Uploader.

Rule Pack Summary:

For a complete list of new and modified rules, click here.

Warning:

Sourcefire VRT rule packs often utilize enhancements made to Snort. Operators should upgrade to the latest revision or patch level for Snort to ensure these enhancements are available before using these rules.

About the VRT:

The Sourcefire VRT is a group of leading edge intrusion detection and prevention experts working to proactively discover, assess and respond to the latest trends in hacking activity, intrusion attempts and vulnerabilities. This team is also supported by the vast resources of the open source Snort community, making it the largest group dedicated to advances in the network security industry.

Posted by on Feb 05, 2008



VRT Rules 2008-01-29

Sourcefire VRT Rules Update

Date: 2008-01-29

Synopsis:

The Sourcefire VRT is aware of vulnerabilities affecting the Cisco Unified Communications Manager and SAP MaxDB.

Details:

Cisco Unified Communications Manager Buffer Overflow (CVE-2008-0027):
A buffer overflow condition in the Certificate Trust List Provider service used by the Cisco Unified Communications Manager may allow a remote attacker to execute code on an affected system.

A rule to detect attacks targeting this vulnerability is included in this release and is identified as SID 13363.

SAP MaxDB Command Injection (CVE-2008-0244):
SAP MaxDB fails to correctly sanitize user-supplied input before passing the data to certain commands. A remote attacker may be able to inject commands to be executed on an affected system via the use of shell meta-characters.

A rule to detect attacks targeting this vulnerability is included in this release and is identified as SID 13356.

Other rules have been added to address the vulnerabilities described in CVE entries CVE-2007-5511, CVE-2007-4731, CVE-2007-6435 and CVE-2007-6335. Multiple rules have also been added to the spyware-put and web-client categories to provide further coverage for additional ActiveX vulnerabilities and spyware programs.

Rule Pack Summary:

For a complete list of new and modified rules, click here.

Warning:

Sourcefire VRT rule packs often utilize enhancements made to Snort. Operators should upgrade to the latest revision or patch level for Snort to ensure these enhancements are available before using these rules.

About the VRT:

The Sourcefire VRT is a group of leading edge intrusion detection and prevention experts working to proactively discover, assess and respond to the latest trends in hacking activity, intrusion attempts and vulnerabilities. This team is also supported by the vast resources of the open source Snort community, making it the largest group dedicated to advances in the network security industry.

Posted by on Jan 29, 2008



1 2 97 98 99 101 103 104 105 131 132