<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic New Dragon IPS signatures released. in End of Service Products</title>
    <link>https://community.extremenetworks.com/t5/end-of-service-products/new-dragon-ips-signatures-released/m-p/21605#M36</link>
    <description>The following NIDS signature updates are available via  liveupdate for Dragon versions 7.x/8.x:&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    EDGE:CHAKRA-SCRIPT-CORRUPT10&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  when Microsoft Edge improperly accesses an object in memory. This vulnerability  may corrupt memory in such a way that an attacker could execute arbitrary code  in the context of the current user. Microsoft has released a patch for this  vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2018-8505" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2018-8505&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2018-8505&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    IE:MEMORY-CORRUPTION-RCE-341&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  when a Microsoft browser improperly accesses an object in memory. This  vulnerability may corrupt memory in such a way that an attacker could execute  arbitrary code in the context of the current user. Microsoft has released a  patch for this vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8460" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8460&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2018-8460&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    IE:MEMORY-CORRUPTION-RCE-342&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  when a Microsoft browser improperly accesses an object in memory. This  vulnerability may corrupt memory in such a way that an attacker could execute  arbitrary code in the context of the current user. Microsoft has released a  patch for this vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8491" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8491&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2018-8491&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    MS:JET-DATABASE-ENGINE-RCE-3&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: There is a vulnerability in the Microsoft  JET Database Engine that may lead to remote code execution. An attacker who  successfully exploited this vulnerability could take control of an affected  system. Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8423" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8423&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2018-8423&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    MS:THEME-API-RCE&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  when the Windows Theme API does not properly decompress files. An attacker who  successfully exploited the vulnerabilities could run arbitrary code in the  context of the current user. Microsoft has released a patch for this vulnerability.  This signature looks for the downloading of a malicious themepack file to the  client system.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8413" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8413&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2018-8413&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    WINDOWS:SHELL-RCE&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  when Windows Shell improperly handles URLs. An attacker who exploited this  vulnerability could gain the same user rights as the current user. Microsoft  has released a patch for this vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2018-8495" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2018-8495&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2018-8495&lt;BR /&gt;
&lt;BR /&gt;
    &lt;BR /&gt;
&lt;BR /&gt;</description>
    <pubDate>Wed, 10 Oct 2018 16:18:00 GMT</pubDate>
    <dc:creator>Dudley__Jeff</dc:creator>
    <dc:date>2018-10-10T16:18:00Z</dc:date>
    <item>
      <title>New Dragon IPS signatures released.</title>
      <link>https://community.extremenetworks.com/t5/end-of-service-products/new-dragon-ips-signatures-released/m-p/21605#M36</link>
      <description>The following NIDS signature updates are available via  liveupdate for Dragon versions 7.x/8.x:&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    EDGE:CHAKRA-SCRIPT-CORRUPT10&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  when Microsoft Edge improperly accesses an object in memory. This vulnerability  may corrupt memory in such a way that an attacker could execute arbitrary code  in the context of the current user. Microsoft has released a patch for this  vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2018-8505" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2018-8505&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2018-8505&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    IE:MEMORY-CORRUPTION-RCE-341&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  when a Microsoft browser improperly accesses an object in memory. This  vulnerability may corrupt memory in such a way that an attacker could execute  arbitrary code in the context of the current user. Microsoft has released a  patch for this vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8460" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8460&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2018-8460&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    IE:MEMORY-CORRUPTION-RCE-342&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  when a Microsoft browser improperly accesses an object in memory. This  vulnerability may corrupt memory in such a way that an attacker could execute  arbitrary code in the context of the current user. Microsoft has released a  patch for this vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8491" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8491&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2018-8491&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    MS:JET-DATABASE-ENGINE-RCE-3&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: There is a vulnerability in the Microsoft  JET Database Engine that may lead to remote code execution. An attacker who  successfully exploited this vulnerability could take control of an affected  system. Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8423" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8423&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2018-8423&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    MS:THEME-API-RCE&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  when the Windows Theme API does not properly decompress files. An attacker who  successfully exploited the vulnerabilities could run arbitrary code in the  context of the current user. Microsoft has released a patch for this vulnerability.  This signature looks for the downloading of a malicious themepack file to the  client system.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8413" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8413&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2018-8413&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    WINDOWS:SHELL-RCE&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  when Windows Shell improperly handles URLs. An attacker who exploited this  vulnerability could gain the same user rights as the current user. Microsoft  has released a patch for this vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2018-8495" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2018-8495&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2018-8495&lt;BR /&gt;
&lt;BR /&gt;
    &lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Wed, 10 Oct 2018 16:18:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/end-of-service-products/new-dragon-ips-signatures-released/m-p/21605#M36</guid>
      <dc:creator>Dudley__Jeff</dc:creator>
      <dc:date>2018-10-10T16:18:00Z</dc:date>
    </item>
  </channel>
</rss>

