Snort mailing list archives

Sourcefire VRT Certified Snort Rules Update 2011-10-11


From: Research <research () sourcefire com>
Date: Tue, 11 Oct 2011 14:40:33 -0400 (EDT)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Sourcefire VRT Certified Snort Rules Update

Synopsis:
The Sourcefire VRT is aware of vulnerabilities affecting products from
Microsoft Corporation.

Details:
Microsoft Security Advisory MS11-075:
The Microsoft Windows operating system contains a programming error
that may allow a remote attacker to execute code on an affected system.

Rules to detect attacks targeting this vulnerability are included in
this release and are identified with GID 1, SIDs 20253 and 20254.

Microsoft Security Advisory MS11-076:
The Microsoft Windows Media Player contains a vulnerability that may
allow a remote attacker to execute code on an affected system via the
loading of a dynamic-link library from a remote location.

Rules to detect attacks targeting this vulnerability are included in
this release and are identified with GID 1, SIDs 18496 and 18497.

Microsoft Security Advisory MS11-077:
The Microsoft Windows operating system contains a vulnerability that
may allow a remote attacker to execute code on an affected system.

Rules to detect attacks targeting this vulnerability are included in
this release and are identified with GID 1, SIDs 20261 and 20269.

Microsoft Security Advisory MS11-078:
Microsoft Silverlight contains a programming error that may allow a
remote attacker to execute code on an affected system.

A rule to detect attacks targeting this vulnerability is included in
this release and is identified with GID 1, SID 20255.

Microsoft Security Advisory MS11-079:
Microsoft Forefront contains programming errors that may allow a remote
attacker to execute code on an affected system.

Rules to detect attacks targeting this vulnerability are included in
this release and are identified with GID 1, SIDs 20256 through 20260
and 20272.

Microsoft Security Advisory MS11-080:
The Microsoft Windows operating system contains a programming error
that may allow a remote attacker to execute code on an affected system.

A rule to detect attacks targeting this vulnerability is included in
this release and is identified with GID 1, SID 20270.

Microsoft Security Advisory MS11-081:
Microsoft Internet Explorer contains multiple vulnerabilities that may
allow a remote attacker to execute code on an affected system.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 20262 through 20268
and 20273.

Microsoft Security Advisory MS11-082:
The Microsoft Host Integration Server contains a vulnerability that may
allow a remote attacker to cause a Denial of Service (DoS) against a
vulnerable host.

A rule to detect attacks targeting this vulnerability is included in
this release and is identified with GID 1, SID 20271.

For a complete list of new and modified rules please see:

http://www.snort.org/vrt/docs/ruleset_changelogs/changes-2011-10-11.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFOlI2haBoqZBVJfwMRAmTbAJ4sPolsVfVf9Jd/pLl8SiyGgePNOQCgiMyp
230Ezkai8anXT+Q1HI1kRww=
=e3rw
-----END PGP SIGNATURE-----


------------------------------------------------------------------------------
All the data continuously generated in your IT infrastructure contains a
definitive record of customers, application performance, security
threats, fraudulent activity and more. Splunk takes this data and makes
sense of it. Business sense. IT sense. Common sense.
http://p.sf.net/sfu/splunk-d2d-oct
_______________________________________________
Snort-sigs mailing list
Snort-sigs () lists sourceforge net
https://lists.sourceforge.net/lists/listinfo/snort-sigs
http://www.snort.org


Please visit http://blog.snort.org for the latest news about Snort!


Current thread: