<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic New IPS/IDS signature release in End of Service Products</title>
    <link>https://community.extremenetworks.com/t5/end-of-service-products/new-ips-ids-signature-release/m-p/23161#M343</link>
    <description>The following NIDS signature updates are available via  liveupdate for Dragon versions 7.x/8.x:&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    EDGE:MEMORY-CORRUPTION-RCE-42&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  when Microsoft Edge improperly accesses an object in memory. This vulnerability  may corrupt memory in such a way that an attacker could execute arbitrary code  in the context of the current user. Microsoft has released a patch for this  vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8731" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8731&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2017-8731&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    EDGE:MEMORY-CORRUPTION-RCE-43&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  when Microsoft Edge improperly accesses an object in memory. This vulnerability  may corrupt memory in such a way that an attacker could execute arbitrary code  in the context of the current user. Microsoft has released a patch for this  vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8734" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8734&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2017-8734&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    EDGE:MEMORY-CORRUPTION-RCE-44&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  when Microsoft Edge renders certain objects in memory. Microsoft has released a  patch for this vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8757" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8757&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2017-8757&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    EDGE:SCRIPT-ENG-MEM-CORRUPT-40&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  in the way that the Scripting Engine renders when handling objects in memory in  Microsoft browsers. This vulnerability may corrupt memory in such a way that an  attacker could execute arbitrary code in the context of the current user.  Microsoft has released a patch for this  vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8738" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8738&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2017-8738&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    EDGE:SCRIPT-ENG-MEM-CORRUPT-41&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  when Microsoft Edge renders certain objects in memory. Microsoft has released a  patch for this vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8753" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8753&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2017-8753&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    IE:MEMORY-CORRUPTION-RCE-330&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code injection vulnerability exists  when Microsoft Internet Explorer incorrectly accesses certain objects in  memory. Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2017-8747" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2017-8747&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2017-8747&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    IE:MEMORY-CORRUPTION-RCE-331&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code injection vulnerability exists  when Microsoft Internet Explorer incorrectly accesses certain objects in  memory. Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2017-8749" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2017-8749&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2017-8749&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    IE:MEMORY-CORRUPTION-RCE-332&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code injection vulnerability exists  when Microsoft browsers incorrectly access certain objects in memory. Microsoft  has released a patch for this vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2017-8750" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2017-8750&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2017-8750&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    MS:DOTNET-REMOTE-CODE-VULN&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  when Microsoft .NET Framework processes untrusted input. Microsoft has released  a patch for this vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8759" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8759&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2017-8759&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    MS:PDF-LIBRARY-2&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  when Microsoft Windows PDF Library improperly handles objects in memory.  Microsoft has released a patch  for this  vulnerability. This signature tests for the "pdf.download" FlowTag  being set before generating an event on network traffic. This FlowTag is  defined by the HTTP:PDF-FILE-DOWNLOAD signature, which is required for this  signature to generate an event.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8728" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8728&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2017-8728&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    MS:PDF-LIBRARY-3&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  when Microsoft Windows PDF Library improperly handles objects in memory.  Microsoft has released a patch  for this  vulnerability. This signature tests for the "pdf.download" FlowTag  being set before generating an event on network traffic. This FlowTag is  defined by the HTTP:PDF-FILE-DOWNLOAD signature, which is required for this  signature to generate an event.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8737" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8737&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2017-8737&lt;BR /&gt;
&lt;BR /&gt;
    &lt;BR /&gt;
&lt;BR /&gt;</description>
    <pubDate>Mon, 18 Sep 2017 16:57:00 GMT</pubDate>
    <dc:creator>Dudley__Jeff</dc:creator>
    <dc:date>2017-09-18T16:57:00Z</dc:date>
    <item>
      <title>New IPS/IDS signature release</title>
      <link>https://community.extremenetworks.com/t5/end-of-service-products/new-ips-ids-signature-release/m-p/23161#M343</link>
      <description>The following NIDS signature updates are available via  liveupdate for Dragon versions 7.x/8.x:&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    EDGE:MEMORY-CORRUPTION-RCE-42&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  when Microsoft Edge improperly accesses an object in memory. This vulnerability  may corrupt memory in such a way that an attacker could execute arbitrary code  in the context of the current user. Microsoft has released a patch for this  vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8731" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8731&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2017-8731&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    EDGE:MEMORY-CORRUPTION-RCE-43&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  when Microsoft Edge improperly accesses an object in memory. This vulnerability  may corrupt memory in such a way that an attacker could execute arbitrary code  in the context of the current user. Microsoft has released a patch for this  vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8734" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8734&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2017-8734&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    EDGE:MEMORY-CORRUPTION-RCE-44&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  when Microsoft Edge renders certain objects in memory. Microsoft has released a  patch for this vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8757" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8757&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2017-8757&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    EDGE:SCRIPT-ENG-MEM-CORRUPT-40&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  in the way that the Scripting Engine renders when handling objects in memory in  Microsoft browsers. This vulnerability may corrupt memory in such a way that an  attacker could execute arbitrary code in the context of the current user.  Microsoft has released a patch for this  vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8738" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8738&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2017-8738&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    EDGE:SCRIPT-ENG-MEM-CORRUPT-41&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  when Microsoft Edge renders certain objects in memory. Microsoft has released a  patch for this vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8753" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8753&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2017-8753&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    IE:MEMORY-CORRUPTION-RCE-330&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code injection vulnerability exists  when Microsoft Internet Explorer incorrectly accesses certain objects in  memory. Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2017-8747" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2017-8747&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2017-8747&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    IE:MEMORY-CORRUPTION-RCE-331&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code injection vulnerability exists  when Microsoft Internet Explorer incorrectly accesses certain objects in  memory. Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2017-8749" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2017-8749&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2017-8749&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    IE:MEMORY-CORRUPTION-RCE-332&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code injection vulnerability exists  when Microsoft browsers incorrectly access certain objects in memory. Microsoft  has released a patch for this vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2017-8750" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2017-8750&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2017-8750&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    MS:DOTNET-REMOTE-CODE-VULN&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  when Microsoft .NET Framework processes untrusted input. Microsoft has released  a patch for this vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8759" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8759&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2017-8759&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    MS:PDF-LIBRARY-2&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  when Microsoft Windows PDF Library improperly handles objects in memory.  Microsoft has released a patch  for this  vulnerability. This signature tests for the "pdf.download" FlowTag  being set before generating an event on network traffic. This FlowTag is  defined by the HTTP:PDF-FILE-DOWNLOAD signature, which is required for this  signature to generate an event.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8728" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8728&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2017-8728&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    MS:PDF-LIBRARY-3&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  when Microsoft Windows PDF Library improperly handles objects in memory.  Microsoft has released a patch  for this  vulnerability. This signature tests for the "pdf.download" FlowTag  being set before generating an event on network traffic. This FlowTag is  defined by the HTTP:PDF-FILE-DOWNLOAD signature, which is required for this  signature to generate an event.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8737" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8737&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2017-8737&lt;BR /&gt;
&lt;BR /&gt;
    &lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Mon, 18 Sep 2017 16:57:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/end-of-service-products/new-ips-ids-signature-release/m-p/23161#M343</guid>
      <dc:creator>Dudley__Jeff</dc:creator>
      <dc:date>2017-09-18T16:57:00Z</dc:date>
    </item>
  </channel>
</rss>

