VRT Advisories


VRT Rules 2010-02-09

Sourcefire VRT Rules Update

Date: 2010-02-09

Synopsis:

The Sourcefire VRT is aware of multiple vulnerabilities affecting Microsoft products.

Details:

Microsoft Security Advisory (MS10-003):
Microsoft Office contains a programming error that may allow a remote attacker to execute code on an affected system.

A rule to detect attacks targeting this vulnerability is included in this release and is identified with GID 3, SID 16416.

Microsoft Security Advisory (MS10-004):
Microsoft PowerPoint contains multiple programming errors that may allow a remote attacker to execute code on an affected system.

Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with GID 3, SIDs 16409 through 16413 and 16421.

Microsoft Security Advisory (MS10-005):
Microsoft Paint contains a programming error that may allow a remote attacker to execute code on an affected system via a malformed JPEG file.

A rule to detect attacks targeting this vulnerability is included in this release and is identified with GID 3, SID 16422.

Microsoft Security Advisory (MS10-006):
The Microsoft implementation of SMB contains a programming error that may allow a remote attacker to execute code on an affected system.

A rule to detect attacks targeting this vulnerability is included in this release and is identified with GID 3, SID 16417.

Microsoft Security Advisory (MS10-007):
The Microsoft Windows shell handler contains a programming error that may allow a remote attacker to execute code on an affected system.

A rule to detect attacks targeting this vulnerability is included in this release and is identified with GID 3, SID 16414.

Microsoft Security Advisory (MS10-008):
Microsoft Internet Explorer improperly handles certain ActiveX controls, which may allow a remote attacker to execute code on an affected system.

Rules to detect attacks targeting this vulnerability are included in this release and are identified with GID 3, SIDs 16419 and 16420.

Microsoft Security Advisory (MS10-009):
The Microsoft TCP/IP implementation does not correctly process IPv6 traffic, which may allow a remote attacker to execute code on an affected system.

A rule to detect attacks targeting this vulnerability is included in this release and is identified with GID 3, SID 16405.

Microsoft Security Advisory (MS10-012):
The Microsoft implementation of SMB contains multiple programming errors that may allow a remote attacker to execute code on an affected system. In some circumstances a Denial of Service (DoS) may occur.

Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with GID 3, SIDs 16395 through 16403.

Additionally, previously released rules may also generate events on attacks targeting these vulnerabilities and are identified with GID 3, SIDs 15009, 15124, 15453 and 15847.

Microsoft Security Advisory (MS10-013):
Microsoft DirectShow contains a programming error that may allow a remote attacker to execute code on a vulnerable system.

A rule to detect attacks targeting this vulnerability is included in this release and is identified with GID 3, SID 16415.

Microsoft Security Advisory (MS10-014):
Microsoft Active Directory contains a programming error that may allow a remote attacker to cause a Denial of Service (DoS) against an affected system.

A rule to detect attacks targeting this vulnerability is included in this release and is identified with GID 3, SID 16394.

Microsoft Internet Explorer Zone Redirect (CVE-2010-0255): Microsoft Internet Explorer fails to prevent the processing of non-HTML documents as HTML text. A remote attacker may utilize this vulnerability to view files on an affected system.

A rule to detect attacks targeting this vulnerability is included in this release and is identified with GID 3, SID 16423.

Rule Pack Summary:

For a complete list of new and modified rules, click here.

Warning:

Sourcefire VRT rule packs often utilize enhancements made to Snort. Operators should upgrade to the latest revision or patch level for Snort to ensure these enhancements are available before using these rules.

About the VRT:

The Sourcefire VRT is a group of leading edge intrusion detection and prevention experts working to proactively discover, assess and respond to the latest trends in hacking activity, intrusion attempts and vulnerabilities. This team is also supported by the vast resources of the open source Snort community, making it the largest group dedicated to advances in the network security industry.