<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic New Dragon Signature release 1/9/2019 in End of Service Products</title>
    <link>https://community.extremenetworks.com/t5/end-of-service-products/new-dragon-signature-release-1-9-2019/m-p/23525#M404</link>
    <description>The following NIDS signature updates are available via liveupdate for Dragon versions 7.x/8.x:&lt;BR /&gt;
 &lt;BR /&gt;
EDGE:CHAKRA-SCRIPT12&lt;BR /&gt;
UPDATE-TYPE: New Signature&lt;BR /&gt;
CLASSIFICATION: BETA&lt;BR /&gt;
DESCRIPTION: A remote code execution vulnerability exists when Microsoft Edge improperly accesses an object in memory. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
REFERENCE: URLREF&lt;BR /&gt;
&lt;A href="https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2019-0539" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2019-0539&lt;/A&gt;&lt;BR /&gt;
REFERENCE: CVE&lt;BR /&gt;
CVE-2019-0539&lt;BR /&gt;
 &lt;BR /&gt;
 &lt;BR /&gt;
EDGE:CHAKRA-SCRIPT13&lt;BR /&gt;
UPDATE-TYPE: New Signature&lt;BR /&gt;
CLASSIFICATION: BETA&lt;BR /&gt;
DESCRIPTION: A remote code execution vulnerability exists when Microsoft Edge improperly accesses an object in memory. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
REFERENCE: URLREF&lt;BR /&gt;
&lt;A href="https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2019-0567" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2019-0567&lt;/A&gt;&lt;BR /&gt;
REFERENCE: CVE&lt;BR /&gt;
CVE-2019-0567&lt;BR /&gt;
 &lt;BR /&gt;
 &lt;BR /&gt;
EDGE:MEMORY-CORRUPTION-RCE-58&lt;BR /&gt;
UPDATE-TYPE: New Signature&lt;BR /&gt;
CLASSIFICATION: BETA&lt;BR /&gt;
DESCRIPTION: A remote code execution vulnerability exists when Microsoft Edge improperly accesses an object in memory. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
REFERENCE: URLREF&lt;BR /&gt;
&lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0565" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0565&lt;/A&gt;&lt;BR /&gt;
REFERENCE: CVE&lt;BR /&gt;
CVE-2019-0565&lt;BR /&gt;
 &lt;BR /&gt;
 &lt;BR /&gt;
EDGE:PRIVILEGE-ESCALATION&lt;BR /&gt;
UPDATE-TYPE: New Signature&lt;BR /&gt;
CLASSIFICATION: BETA&lt;BR /&gt;
DESCRIPTION: An elevation of privilege vulnerability exists in Microsoft Edge Browser Broker COM object. An attacker who successfully exploited the vulnerability could use the Browser Broker COM object to elevate privileges on an affected system. This vulnerability by itself does not allow arbitrary code execution; however, it could allow arbitrary code to be run if the attacker uses it in combination with another vulnerability (such as a remote code execution vulnerability or another elevation of privilege vulnerability) that is capable of leveraging the elevated privileges when code execution is attempted. Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
REFERENCE: URLREF&lt;BR /&gt;
&lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0566" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0566&lt;/A&gt;&lt;BR /&gt;
REFERENCE: CVE&lt;BR /&gt;
CVE-2019-0566&lt;BR /&gt;
 &lt;BR /&gt;
 &lt;BR /&gt;
EDGE:SCRIPT-ENG-MEM-CORRUPT-96&lt;BR /&gt;
UPDATE-TYPE: New Signature&lt;BR /&gt;
CLASSIFICATION: BETA&lt;BR /&gt;
DESCRIPTION: A remote code execution vulnerability exists in the way that the Scripting Engine renders when handling objects in memory in Microsoft browsers. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
REFERENCE: URLREF&lt;BR /&gt;
&lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0568" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0568&lt;/A&gt;&lt;BR /&gt;
REFERENCE: CVE&lt;BR /&gt;
CVE-2019-0568&lt;BR /&gt;
 &lt;BR /&gt;
 &lt;BR /&gt;
IE:MSHTML-REMOTE-CODE&lt;BR /&gt;
UPDATE-TYPE: New Signature&lt;BR /&gt;
CLASSIFICATION: BETA&lt;BR /&gt;
DESCRIPTION: A remote code execution vulnerability exists in the way that the MSHTML engine inproperly validates input. An attacker could execute arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
REFERENCE: URLREF&lt;BR /&gt;
&lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0541" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0541&lt;/A&gt;&lt;BR /&gt;
REFERENCE: CVE&lt;BR /&gt;
CVE-2019-0541</description>
    <pubDate>Wed, 09 Jan 2019 21:12:00 GMT</pubDate>
    <dc:creator>Dudley__Jeff</dc:creator>
    <dc:date>2019-01-09T21:12:00Z</dc:date>
    <item>
      <title>New Dragon Signature release 1/9/2019</title>
      <link>https://community.extremenetworks.com/t5/end-of-service-products/new-dragon-signature-release-1-9-2019/m-p/23525#M404</link>
      <description>The following NIDS signature updates are available via liveupdate for Dragon versions 7.x/8.x:&lt;BR /&gt;
 &lt;BR /&gt;
EDGE:CHAKRA-SCRIPT12&lt;BR /&gt;
UPDATE-TYPE: New Signature&lt;BR /&gt;
CLASSIFICATION: BETA&lt;BR /&gt;
DESCRIPTION: A remote code execution vulnerability exists when Microsoft Edge improperly accesses an object in memory. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
REFERENCE: URLREF&lt;BR /&gt;
&lt;A href="https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2019-0539" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2019-0539&lt;/A&gt;&lt;BR /&gt;
REFERENCE: CVE&lt;BR /&gt;
CVE-2019-0539&lt;BR /&gt;
 &lt;BR /&gt;
 &lt;BR /&gt;
EDGE:CHAKRA-SCRIPT13&lt;BR /&gt;
UPDATE-TYPE: New Signature&lt;BR /&gt;
CLASSIFICATION: BETA&lt;BR /&gt;
DESCRIPTION: A remote code execution vulnerability exists when Microsoft Edge improperly accesses an object in memory. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
REFERENCE: URLREF&lt;BR /&gt;
&lt;A href="https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2019-0567" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2019-0567&lt;/A&gt;&lt;BR /&gt;
REFERENCE: CVE&lt;BR /&gt;
CVE-2019-0567&lt;BR /&gt;
 &lt;BR /&gt;
 &lt;BR /&gt;
EDGE:MEMORY-CORRUPTION-RCE-58&lt;BR /&gt;
UPDATE-TYPE: New Signature&lt;BR /&gt;
CLASSIFICATION: BETA&lt;BR /&gt;
DESCRIPTION: A remote code execution vulnerability exists when Microsoft Edge improperly accesses an object in memory. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
REFERENCE: URLREF&lt;BR /&gt;
&lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0565" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0565&lt;/A&gt;&lt;BR /&gt;
REFERENCE: CVE&lt;BR /&gt;
CVE-2019-0565&lt;BR /&gt;
 &lt;BR /&gt;
 &lt;BR /&gt;
EDGE:PRIVILEGE-ESCALATION&lt;BR /&gt;
UPDATE-TYPE: New Signature&lt;BR /&gt;
CLASSIFICATION: BETA&lt;BR /&gt;
DESCRIPTION: An elevation of privilege vulnerability exists in Microsoft Edge Browser Broker COM object. An attacker who successfully exploited the vulnerability could use the Browser Broker COM object to elevate privileges on an affected system. This vulnerability by itself does not allow arbitrary code execution; however, it could allow arbitrary code to be run if the attacker uses it in combination with another vulnerability (such as a remote code execution vulnerability or another elevation of privilege vulnerability) that is capable of leveraging the elevated privileges when code execution is attempted. Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
REFERENCE: URLREF&lt;BR /&gt;
&lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0566" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0566&lt;/A&gt;&lt;BR /&gt;
REFERENCE: CVE&lt;BR /&gt;
CVE-2019-0566&lt;BR /&gt;
 &lt;BR /&gt;
 &lt;BR /&gt;
EDGE:SCRIPT-ENG-MEM-CORRUPT-96&lt;BR /&gt;
UPDATE-TYPE: New Signature&lt;BR /&gt;
CLASSIFICATION: BETA&lt;BR /&gt;
DESCRIPTION: A remote code execution vulnerability exists in the way that the Scripting Engine renders when handling objects in memory in Microsoft browsers. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
REFERENCE: URLREF&lt;BR /&gt;
&lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0568" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0568&lt;/A&gt;&lt;BR /&gt;
REFERENCE: CVE&lt;BR /&gt;
CVE-2019-0568&lt;BR /&gt;
 &lt;BR /&gt;
 &lt;BR /&gt;
IE:MSHTML-REMOTE-CODE&lt;BR /&gt;
UPDATE-TYPE: New Signature&lt;BR /&gt;
CLASSIFICATION: BETA&lt;BR /&gt;
DESCRIPTION: A remote code execution vulnerability exists in the way that the MSHTML engine inproperly validates input. An attacker could execute arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
REFERENCE: URLREF&lt;BR /&gt;
&lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0541" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0541&lt;/A&gt;&lt;BR /&gt;
REFERENCE: CVE&lt;BR /&gt;
CVE-2019-0541</description>
      <pubDate>Wed, 09 Jan 2019 21:12:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/end-of-service-products/new-dragon-signature-release-1-9-2019/m-p/23525#M404</guid>
      <dc:creator>Dudley__Jeff</dc:creator>
      <dc:date>2019-01-09T21:12:00Z</dc:date>
    </item>
  </channel>
</rss>

