Snort mailing list archives
Sourcefire VRT Certified Snort Rules Update 2012-01-10
From: Research <research () sourcefire com>
Date: Tue, 10 Jan 2012 12:21:55 -0500 (EST)
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Sourcefire VRT Certified Snort Rules Update Synopsis: The Sourcefire VRT is aware of vulnerabilities affecting products from Microsoft Corporation and Adobe Inc. Details: Microsoft Security Advisory MS12-002: Microsoft Windows contains a programming error that may allow a remote attacker to execute code on an affected system. Rules to detect attacks targeting this vulnerability are included in this release and are identified with GID 1, SIDs 20878 and 20879. Microsoft Security Advisory MS12-004: The Microsoft Windows Media Player contains vulnerabilities that may allow a remote attacker to execute code on an affected system. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with GID 1, SIDs 20880 and 20900. Microsoft Security Advisory MS12-005: The Microsoft Object Linking and Embedding engine contains a vulnerability that may allow a remote attacker to execute code on an affected system. Rules to detect attacks targeting this vulnerability are included in this release and are identified with GID 1, SIDs 20881 through 20883. Microsoft Security Advisory MS12-006: The SSL CBC encryption algorithm contains a programming error that may lead to information disclosure. A rule to detect attacks targeting this vulnerability is included in this release and is identified with GID 1, SID 20212. Microsoft Security Advisory MS12-007: The Microsoft Anti-Cross Site Scripting Library contains a programming error that may allow a remote attacker to execute code on an affected system. A rule to detect attacks targeting this vulnerability is included in this release and is identified with GID 1, SID 20884. Adobe Security Bulletin APSB12-01: Adobe Acrobat and Reader contain programming errors that may allow a remote attacker to execute code on an affected system. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with GID 1, SIDs 20919 through 20923. Additionally this release contains new and modified rules in the backdoor, blacklist, botnet-cnc, dos, exploit, file-identify, misc, multimedia, netbios, policy, snmp, specific-threats, sql, web-activex, web-client and web-misc rule sets to provide coverage for emerging threats from these technologies. For a complete list of new and modified rules please see: http://www.snort.org/vrt/docs/ruleset_changelogs/changes-2012-01-10.html -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux) iD8DBQFPDHOzaBoqZBVJfwMRApHOAJ4hlgxrOsCyAxzABj0JB3crh4QV0ACfezOI Mdgz++B1hmO+EWKM/RifoQY= =0zGa -----END PGP SIGNATURE----- ------------------------------------------------------------------------------ Write once. Port to many. Get the SDK and tools to simplify cross-platform app development. Create new or port existing apps to sell to consumers worldwide. Explore the Intel AppUpSM program developer opportunity. appdeveloper.intel.com/join http://p.sf.net/sfu/intel-appdev _______________________________________________ Snort-sigs mailing list Snort-sigs () lists sourceforge net https://lists.sourceforge.net/lists/listinfo/snort-sigs http://www.snort.org Please visit http://blog.snort.org for the latest news about Snort!
Current thread:
- Sourcefire VRT Certified Snort Rules Update 2012-01-10 Research (Jan 10)
 
