<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic New Dragon IPS siganture release September 2019 in End of Service Products</title>
    <link>https://community.extremenetworks.com/t5/end-of-service-products/new-dragon-ips-siganture-release-september-2019/m-p/23823#M441</link>
    <description>The following NIDS signature updates are available via liveupdate for Dragon versions 7.x/8.x:&lt;BR /&gt;
 &lt;BR /&gt;
MS:RDP-CLIENT-EXPLOIT-ATTEMPT&lt;BR /&gt;
UPDATE-TYPE: New Signature&lt;BR /&gt;
CLASSIFICATION: BETA&lt;BR /&gt;
DESCRIPTION: A remote code execution vulnerability exists in the Windows Remote Desktop Client when a user connects to a malicious server. An attacker who successfully exploited this vulnerability could execute arbitrary code on the computer of the connecting client. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Microsoft has released a patch for this vulnerability. Due to the potential for this signature to generate false positives, it has been disabled by default.&lt;BR /&gt;
REFERENCE: URLREF&lt;BR /&gt;
&lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0787" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0787&lt;/A&gt;&lt;BR /&gt;
REFERENCE: CVE&lt;BR /&gt;
CVE-2019-0787&lt;BR /&gt;
 &lt;BR /&gt;
 &lt;BR /&gt;
MS:RDP-CLIENT-EXPLOIT-ATTEMPT-2&lt;BR /&gt;
UPDATE-TYPE: New Signature&lt;BR /&gt;
CLASSIFICATION: BETA&lt;BR /&gt;
DESCRIPTION: A remote code execution vulnerability exists in the Windows Remote Desktop Client when a user connects to a malicious server. An attacker who successfully exploited this vulnerability could execute arbitrary code on the computer of the connecting client. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Microsoft has released a patch for this vulnerability. This signature looks for a malicious binary being downloaded to the client.&lt;BR /&gt;
REFERENCE: URLREF&lt;BR /&gt;
&lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0788" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0788&lt;/A&gt;&lt;BR /&gt;
REFERENCE: CVE&lt;BR /&gt;
CVE-2019-0788&lt;BR /&gt;
 &lt;BR /&gt;
 &lt;BR /&gt;
MS:SHAREPOINT-RCE&lt;BR /&gt;
UPDATE-TYPE: New Signature&lt;BR /&gt;
CLASSIFICATION: BETA&lt;BR /&gt;
DESCRIPTION: A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the SharePoint application pool and the SharePoint server farm account. Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
REFERENCE: URLREF&lt;BR /&gt;
&lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1257" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1257&lt;/A&gt;&lt;BR /&gt;
REFERENCE: CVE&lt;BR /&gt;
CVE-2019-1257&lt;BR /&gt;
 &lt;BR /&gt;
 &lt;BR /&gt;
MS:SHAREPOINT-RCE-2&lt;BR /&gt;
UPDATE-TYPE: New Signature&lt;BR /&gt;
CLASSIFICATION: BETA&lt;BR /&gt;
DESCRIPTION: A remote code execution vulnerability exists in Microsoft SharePoint where APIs aren't properly protected from unsafe data input. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the SharePoint application pool and the SharePoint server farm account. Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
REFERENCE: URLREF&lt;BR /&gt;
&lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1295" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1295&lt;/A&gt;&lt;BR /&gt;
REFERENCE: CVE&lt;BR /&gt;
CVE-2019-1295&lt;BR /&gt;
 &lt;BR /&gt;
 &lt;BR /&gt;
MS:SHAREPOINT-RCE-3&lt;BR /&gt;
UPDATE-TYPE: New Signature&lt;BR /&gt;
CLASSIFICATION: BETA&lt;BR /&gt;
DESCRIPTION: A remote code execution vulnerability exists in Microsoft SharePoint where APIs aren't properly protected from unsafe data input. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the SharePoint application pool and the SharePoint server farm account. Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
REFERENCE: URLREF&lt;BR /&gt;
&lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1296" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1296&lt;/A&gt;&lt;BR /&gt;
REFERENCE: CVE&lt;BR /&gt;
CVE-2019-1296</description>
    <pubDate>Wed, 11 Sep 2019 19:47:00 GMT</pubDate>
    <dc:creator>Dudley__Jeff</dc:creator>
    <dc:date>2019-09-11T19:47:00Z</dc:date>
    <item>
      <title>New Dragon IPS siganture release September 2019</title>
      <link>https://community.extremenetworks.com/t5/end-of-service-products/new-dragon-ips-siganture-release-september-2019/m-p/23823#M441</link>
      <description>The following NIDS signature updates are available via liveupdate for Dragon versions 7.x/8.x:&lt;BR /&gt;
 &lt;BR /&gt;
MS:RDP-CLIENT-EXPLOIT-ATTEMPT&lt;BR /&gt;
UPDATE-TYPE: New Signature&lt;BR /&gt;
CLASSIFICATION: BETA&lt;BR /&gt;
DESCRIPTION: A remote code execution vulnerability exists in the Windows Remote Desktop Client when a user connects to a malicious server. An attacker who successfully exploited this vulnerability could execute arbitrary code on the computer of the connecting client. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Microsoft has released a patch for this vulnerability. Due to the potential for this signature to generate false positives, it has been disabled by default.&lt;BR /&gt;
REFERENCE: URLREF&lt;BR /&gt;
&lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0787" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0787&lt;/A&gt;&lt;BR /&gt;
REFERENCE: CVE&lt;BR /&gt;
CVE-2019-0787&lt;BR /&gt;
 &lt;BR /&gt;
 &lt;BR /&gt;
MS:RDP-CLIENT-EXPLOIT-ATTEMPT-2&lt;BR /&gt;
UPDATE-TYPE: New Signature&lt;BR /&gt;
CLASSIFICATION: BETA&lt;BR /&gt;
DESCRIPTION: A remote code execution vulnerability exists in the Windows Remote Desktop Client when a user connects to a malicious server. An attacker who successfully exploited this vulnerability could execute arbitrary code on the computer of the connecting client. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Microsoft has released a patch for this vulnerability. This signature looks for a malicious binary being downloaded to the client.&lt;BR /&gt;
REFERENCE: URLREF&lt;BR /&gt;
&lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0788" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0788&lt;/A&gt;&lt;BR /&gt;
REFERENCE: CVE&lt;BR /&gt;
CVE-2019-0788&lt;BR /&gt;
 &lt;BR /&gt;
 &lt;BR /&gt;
MS:SHAREPOINT-RCE&lt;BR /&gt;
UPDATE-TYPE: New Signature&lt;BR /&gt;
CLASSIFICATION: BETA&lt;BR /&gt;
DESCRIPTION: A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the SharePoint application pool and the SharePoint server farm account. Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
REFERENCE: URLREF&lt;BR /&gt;
&lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1257" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1257&lt;/A&gt;&lt;BR /&gt;
REFERENCE: CVE&lt;BR /&gt;
CVE-2019-1257&lt;BR /&gt;
 &lt;BR /&gt;
 &lt;BR /&gt;
MS:SHAREPOINT-RCE-2&lt;BR /&gt;
UPDATE-TYPE: New Signature&lt;BR /&gt;
CLASSIFICATION: BETA&lt;BR /&gt;
DESCRIPTION: A remote code execution vulnerability exists in Microsoft SharePoint where APIs aren't properly protected from unsafe data input. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the SharePoint application pool and the SharePoint server farm account. Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
REFERENCE: URLREF&lt;BR /&gt;
&lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1295" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1295&lt;/A&gt;&lt;BR /&gt;
REFERENCE: CVE&lt;BR /&gt;
CVE-2019-1295&lt;BR /&gt;
 &lt;BR /&gt;
 &lt;BR /&gt;
MS:SHAREPOINT-RCE-3&lt;BR /&gt;
UPDATE-TYPE: New Signature&lt;BR /&gt;
CLASSIFICATION: BETA&lt;BR /&gt;
DESCRIPTION: A remote code execution vulnerability exists in Microsoft SharePoint where APIs aren't properly protected from unsafe data input. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the SharePoint application pool and the SharePoint server farm account. Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
REFERENCE: URLREF&lt;BR /&gt;
&lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1296" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1296&lt;/A&gt;&lt;BR /&gt;
REFERENCE: CVE&lt;BR /&gt;
CVE-2019-1296</description>
      <pubDate>Wed, 11 Sep 2019 19:47:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/end-of-service-products/new-dragon-ips-siganture-release-september-2019/m-p/23823#M441</guid>
      <dc:creator>Dudley__Jeff</dc:creator>
      <dc:date>2019-09-11T19:47:00Z</dc:date>
    </item>
  </channel>
</rss>

