VRT Rules 2006-04-12
Sourcefire VRT Update
The Sourcefire VRT has learned of multiple vulnerabilities affecting hosts using the Microsoft operating system and Veritas NetBackup.
Microsoft Security Bulletin MS06-013
Internet Explorer does not correctly handle ActiveX controls. Certain COM objects can be called by Internet Explorer and executed as ActiveX controls. When this is achieved, it may be possible for an attacker to overwrite portions of memory and execute code of their choosing.
Rules to detect attacks against this vulnerability are included in this rule pack and are identified as sids 6002 through 6009.
A vulnerability exists in the way that the Veritas NetBackup Server validates input passed to various daemon processes. It may be possible for an attacker to supply a large amount of data to the vnet daemon and subsequently overflow a fixed length buffer and run code of their choosing.
Rules to detect attacks against this vulnerability are included in this rule pack and are identified as sids 6010 and 6011.
Rule Pack Summary:
For a complete list of new and modified rules, click here.
Sourcefire VRT rule packs often utilize enhancements made to Snort. Operators should upgrade to the latest revision or patch level for Snort to ensure these enhancements are available before using these rules.
About the VRT:
The Sourcefire VRT is a group of leading edge intrusion detection and prevention experts working to proactively discover, assess and respond to the latest trends in hacking activity, intrusion attempts and vulnerabilities. This team is also supported by the vast resources of the open source Snort community, making it the largest group dedicated to advances in network security industry.