Home page logo
/

snort logo Snort mailing list archives

Sourcefire VRT Certified Snort Rules Update 2010-12-09
From: Research <research () sourcefire com>
Date: Thu, 9 Dec 2010 14:51:20 -0500 (EST)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Sourcefire VRT Certified Snort Rules Update

Synopsis:
The Sourcefire VRT is aware of a vulnerability affecting Internet
Explorer.

Details:
Microsoft Internet Explorer Remote Code Execution:
Microsoft Internet Explorer contains a programming error that may allow
a remote attacker to execute code on an affected system. The problem
occurs when the application attempts to reference memory after it has
been freed.

A rule to detect attacks targeting this vulnerability is included in
this release and is identified with GID 1, SID 18196.

Additionally the Sourcefire VRT has added and modified multiple rules
in the netbios and specific-threats  rule sets to provide coverage for
emerging threats from these technologies.

For a complete list of new and modified rules please see:

http://www.snort.org/vrt/docs/ruleset_changelogs/changes-2010-12-09.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.6 (GNU/Linux)

iD8DBQFNATM4QcQOxItLLaMRAi39AKCO6VeY82mAX68JWlQM15RJNRctXQCfUlCT
TXnZJtuanQepw2eYDpWTs+U=
=Tzu8
-----END PGP SIGNATURE-----


------------------------------------------------------------------------------
_______________________________________________
Snort-sigs mailing list
Snort-sigs () lists sourceforge net
https://lists.sourceforge.net/lists/listinfo/snort-sigs


  By Date           By Thread  

Current thread:
  • Sourcefire VRT Certified Snort Rules Update 2010-12-09 Research (Dec 09)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]