VRT Advisories

1 2 119 120 121 123 125 126 127 132 133


VRT Rules 2006-05-10

Sourcefire VRT Update

Date: 2006-05-10

Synopsis:

The Sourcefire VRT has learned of vulnerabilities affecting hosts using the Microsoft operating system.

Details:

Microsoft Security Bulletin MS06-18 A vulnerability exists in the implementation of the Microsoft Distributed Transaction Coordinator (MSDTC) due to a programming error which may present an attacker with the opportunity to deny service to legitimate users. MSDTC fails to properly check the length of data supplied to the service before passing it along to a fixed length buffer. This vulnerability does not allow an attacker to run code of their choosing, but it will cause the MSDTC service to stop responding.

CVE-2006-0034 Excess data passed to the opcodes BuildContextW or BuildContext may cause a heap based overflow to occur and cause the MSDTC service to stop responding.

Rules to detect attacks against this vulnerability are included in this rule pack and are identified as sids 6443 through 6466.

CVE-2006-1184 Excess data in the values for uuidstring or guidin passed in a BuildContextW request may cause the MSDTC service to attempt to access memory it cannot use. The MSDTC service will cease responding.

Rules to detect attacks against this vulnerability are included in this rule pack and are identified as sids 6419 through 6442.

Rule Pack Summary:

For a complete list of new and modified rules, click here.

Warning:

Sourcefire VRT rule packs often utilize enhancements made to Snort. Operators should upgrade to the latest revision or patch level for Snort to ensure these enhancements are available before using these rules.

About the VRT:

The Sourcefire VRT is a group of leading edge intrusion detection and prevention experts working to proactively discover, assess and respond to the latest trends in hacking activity, intrusion attempts and vulnerabilities. This team is also supported by the vast resources of the open source Snort community, making it the largest group dedicated to advances in network security industry.

Posted by on May 10, 2006



VRT Rules 2006-05-05

Sourcefire VRT Update

Date: 2006-05-05

Synopsis:

The Sourcefire VRT has added multiple rules to detect the use of Spyware and potentially unwanted technology on a protected network.

Details:

After receiving a favorable response from customers and the community, the Sourcefire VRT is continuing research in the field of Spyware and potentially unwanted technology. As a result of this research, multiple new rules have been added to the Spyware and Backdoor rule sets.

Each rule is also accompanied by detailed documentation for each spyware, trojan and potentially unwanted software to assist in determining the likelihood of infection and has relevant links to information regarding their removal.

Rule Pack Summary:

For a complete list of new and modified rules, click here.

Warning:

Sourcefire VRT rule packs often utilize enhancements made to Snort. Operators should upgrade to the latest revision or patch level for Snort to ensure these enhancements are available before using these rules.

About the VRT:

The Sourcefire VRT is a group of leading edge intrusion detection and prevention experts working to proactively discover, assess and respond to the latest trends in hacking activity, intrusion attempts and vulnerabilities. This team is also supported by the vast resources of the open source Snort community, making it the largest group dedicated to advances in network security industry.

Posted by on May 05, 2006



VRT Rules 2006-04-25

Sourcefire VRT Update

Date: 2006-04-25

Synopsis:

The Sourcefire VRT has added multiple rules to detect the use of Spyware and potentially unwanted technology on a protected network. These rules have been given their own category and a new rule group. The VRT has also modified and improved numerous other rules.

Details:

Spyware-put.rules

This new rule category contains rules to detect the use of numerous spyware and other potentially unwanted technology using Snort. More than 250 new rules have been added to this group.

Backdoor.rules

The backdoor.rules group has been modified and updated to better detect the use of trojan horse programs on a protected network. More than 150 new rules have been added to detect new trojan horse programs and variations on older remote administration tools.

Each rule is also accompanied by detailed documentation for each spyware, trojan and potentially unwanted software to assist in determining the likelihood of infection and has relvant links to information regarding their removal.

Rule Pack Summary:

For a complete list of new and modified rules, click here.

Warning:

Sourcefire VRT rule packs often utilize enhancements made to Snort. Operators should upgrade to the latest revision or patch level for Snort to ensure these enhancements are available before using these rules.

About the VRT:

The Sourcefire VRT is a group of leading edge intrusion detection and prevention experts working to proactively discover, assess and respond to the latest trends in hacking activity, intrusion attempts and vulnerabilities. This team is also supported by the vast resources of the open source Snort community, making it the largest group dedicated to advances in network security industry.

Posted by on Apr 25, 2006



VRT Rules 2006-04-12

Sourcefire VRT Update

Date: 2006-04-12

Synopsis:

The Sourcefire VRT has learned of multiple vulnerabilities affecting hosts using the Microsoft operating system and Veritas NetBackup.

Details:

Microsoft Security Bulletin MS06-013

Internet Explorer does not correctly handle ActiveX controls. Certain COM objects can be called by Internet Explorer and executed as ActiveX controls. When this is achieved, it may be possible for an attacker to overwrite portions of memory and execute code of their choosing.

Rules to detect attacks against this vulnerability are included in this rule pack and are identified as sids 6002 through 6009.

Veritas NetBackup

A vulnerability exists in the way that the Veritas NetBackup Server validates input passed to various daemon processes. It may be possible for an attacker to supply a large amount of data to the vnet daemon and subsequently overflow a fixed length buffer and run code of their choosing.

Rules to detect attacks against this vulnerability are included in this rule pack and are identified as sids 6010 and 6011.

Rule Pack Summary:

For a complete list of new and modified rules, click here.

Warning:

Sourcefire VRT rule packs often utilize enhancements made to Snort. Operators should upgrade to the latest revision or patch level for Snort to ensure these enhancements are available before using these rules.

About the VRT:

The Sourcefire VRT is a group of leading edge intrusion detection and prevention experts working to proactively discover, assess and respond to the latest trends in hacking activity, intrusion attempts and vulnerabilities. This team is also supported by the vast resources of the open source Snort community, making it the largest group dedicated to advances in network security industry.

Posted by on Apr 12, 2006



VRT Rules 2006-03-29

Sourcefire VRT Update

Date: 2006-03-29

Synopsis:

The Sourcefire VRT has learned of vulnerabilities affecting hosts using Sendmail and has identified additional attack vectors for vulnerabilities affecting Microsoft HTML Help Workshop.

Details:

A race condition exists in versions of Sendmail, this vulnerability may allow a remote attacker to execute code of their choosing on an affected server. A programming error in the way that Sendmail handles asynchronous signals may allow an attacker to overflow a fixed length buffer by supplying a large amount of data in an email header.

A rule to detect attacks targeting this vulnerability is included in this update and is identified as sid 5739.

HTML Help Workshop fails to properly validate file contents before reading and putting information into a fixed length buffer. A malicious file may contain information that could overflow the buffer and execute code on the affected system.

Rules to detect attacks targeting this vulnerability are included in this update and are identified as sids 5740 and 5741.

Rule Pack Summary:

For a complete list of new and modified rules, click here.

Warning:

Sourcefire VRT rule packs often utilize enhancements made to Snort. Operators should upgrade to the latest revision or patch level for Snort to ensure these enhancements are available before using these rules.

About the VRT:

The Sourcefire VRT is a group of leading edge intrusion detection and prevention experts working to proactively discover, assess and respond to the latest trends in hacking activity, intrusion attempts and vulnerabilities. This team is also supported by the vast resources of the open source Snort community, making it the largest group dedicated to advances in network security industry.

Posted by on Mar 29, 2006



1 2 119 120 121 123 125 126 127 132 133