<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic New Dragon IPS signature release December 2018 in End of Service Products</title>
    <link>https://community.extremenetworks.com/t5/end-of-service-products/new-dragon-ips-signature-release-december-2018/m-p/24112#M472</link>
    <description>The following NIDS signature updates are available via liveupdate for Dragon versions 7.x/8.x:&lt;BR /&gt;
 &lt;BR /&gt;
EDGE:CHAKRA-SCRIPT11&lt;BR /&gt;
UPDATE-TYPE: New Signature&lt;BR /&gt;
CLASSIFICATION: BETA&lt;BR /&gt;
DESCRIPTION: A remote code execution vulnerability exists when Microsoft Edge improperly accesses an object in memory. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
REFERENCE: URLREF&lt;BR /&gt;
&lt;A href="https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2018-8624" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2018-8624&lt;/A&gt;&lt;BR /&gt;
REFERENCE: CVE&lt;BR /&gt;
CVE-2018-8624&lt;BR /&gt;
 &lt;BR /&gt;
 &lt;BR /&gt;
EDGE:SCRIPT-ENG-MEM-CORRUPT-93&lt;BR /&gt;
UPDATE-TYPE: New Signature&lt;BR /&gt;
CLASSIFICATION: BETA&lt;BR /&gt;
DESCRIPTION: A remote code execution vulnerability exists in the way that the Scripting Engine renders when handling objects in memory in Microsoft browsers. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
REFERENCE: URLREF&lt;BR /&gt;
&lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8629" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8629&lt;/A&gt;&lt;BR /&gt;
REFERENCE: CVE&lt;BR /&gt;
CVE-2018-8629&lt;BR /&gt;
 &lt;BR /&gt;
 &lt;BR /&gt;
EDGE:SCRIPT-ENG-MEM-CORRUPT-94&lt;BR /&gt;
UPDATE-TYPE: New Signature&lt;BR /&gt;
CLASSIFICATION: BETA&lt;BR /&gt;
DESCRIPTION: A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
REFERENCE: URLREF&lt;BR /&gt;
&lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8583" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8583&lt;/A&gt;&lt;BR /&gt;
REFERENCE: CVE&lt;BR /&gt;
CVE-2018-8583&lt;BR /&gt;
 &lt;BR /&gt;
 &lt;BR /&gt;
EDGE:SCRIPT-ENG-MEM-CORRUPT-95&lt;BR /&gt;
UPDATE-TYPE: New Signature&lt;BR /&gt;
CLASSIFICATION: BETA&lt;BR /&gt;
DESCRIPTION: A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
REFERENCE: URLREF&lt;BR /&gt;
&lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8618" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8618&lt;/A&gt;&lt;BR /&gt;
REFERENCE: CVE&lt;BR /&gt;
CVE-2018-8618&lt;BR /&gt;
 &lt;BR /&gt;
 &lt;BR /&gt;
IE:MEMORY-CORRUPTION-RCE-343&lt;BR /&gt;
UPDATE-TYPE: New Signature&lt;BR /&gt;
CLASSIFICATION: BETA&lt;BR /&gt;
DESCRIPTION: A remote code execution vulnerability exists when a Microsoft browser improperly accesses an object in memory. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
REFERENCE: URLREF&lt;BR /&gt;
&lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8631" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8631&lt;/A&gt;&lt;BR /&gt;
REFERENCE: CVE&lt;BR /&gt;
CVE-2018-8631&lt;BR /&gt;
 &lt;BR /&gt;
 &lt;BR /&gt;
IE:SCRIPTING-ENGINE-RCE-59&lt;BR /&gt;
UPDATE-TYPE: New Signature&lt;BR /&gt;
CLASSIFICATION: BETA&lt;BR /&gt;
DESCRIPTION: A remote code execution vulnerability exists in the way that the Scripting Engine renders when handling objects in memory in Microsoft browsers. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
REFERENCE: URLREF&lt;BR /&gt;
&lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8643" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8643&lt;/A&gt;&lt;BR /&gt;
REFERENCE: CVE&lt;BR /&gt;
CVE-2018-8643&lt;BR /&gt;
 &lt;BR /&gt;
 &lt;BR /&gt;
IE:SCRIPTING-ENGINE-RCE-60&lt;BR /&gt;
UPDATE-TYPE: New Signature&lt;BR /&gt;
CLASSIFICATION: BETA&lt;BR /&gt;
DESCRIPTION: A remote code execution vulnerability exists in Internet Explorer when the VBScript execution policy does not properly restrict VBScript under specific conditions. Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
REFERENCE: URLREF&lt;BR /&gt;
&lt;A href="https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2018-8619" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2018-8619&lt;/A&gt;&lt;BR /&gt;
REFERENCE: CVE&lt;BR /&gt;
CVE-2018-8619&lt;BR /&gt;
 &lt;BR /&gt;
 &lt;BR /&gt;
MS:TEXT-TO-SPEECH-RCE&lt;BR /&gt;
UPDATE-TYPE: New Signature&lt;BR /&gt;
CLASSIFICATION: BETA&lt;BR /&gt;
DESCRIPTION: A remote code execution vulnerability exists in Windows where Microsoft text-to-speech fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could take control of the affected system. Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
REFERENCE: URLREF&lt;BR /&gt;
&lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8634" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8634&lt;/A&gt;&lt;BR /&gt;
REFERENCE: CVE&lt;BR /&gt;
CVE-2018-8634&lt;BR /&gt;
 &lt;BR /&gt;
 &lt;BR /&gt;
MS:VBSCRIPT-ENGINE-RCE-4&lt;BR /&gt;
UPDATE-TYPE: New Signature&lt;BR /&gt;
CLASSIFICATION: BETA&lt;BR /&gt;
DESCRIPTION: A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
REFERENCE: URLREF&lt;BR /&gt;
&lt;A href="https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2018-8625" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2018-8625&lt;/A&gt;&lt;BR /&gt;
REFERENCE: CVE&lt;BR /&gt;
CVE-2018-8625</description>
    <pubDate>Wed, 12 Dec 2018 20:18:00 GMT</pubDate>
    <dc:creator>Dudley__Jeff</dc:creator>
    <dc:date>2018-12-12T20:18:00Z</dc:date>
    <item>
      <title>New Dragon IPS signature release December 2018</title>
      <link>https://community.extremenetworks.com/t5/end-of-service-products/new-dragon-ips-signature-release-december-2018/m-p/24112#M472</link>
      <description>The following NIDS signature updates are available via liveupdate for Dragon versions 7.x/8.x:&lt;BR /&gt;
 &lt;BR /&gt;
EDGE:CHAKRA-SCRIPT11&lt;BR /&gt;
UPDATE-TYPE: New Signature&lt;BR /&gt;
CLASSIFICATION: BETA&lt;BR /&gt;
DESCRIPTION: A remote code execution vulnerability exists when Microsoft Edge improperly accesses an object in memory. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
REFERENCE: URLREF&lt;BR /&gt;
&lt;A href="https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2018-8624" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2018-8624&lt;/A&gt;&lt;BR /&gt;
REFERENCE: CVE&lt;BR /&gt;
CVE-2018-8624&lt;BR /&gt;
 &lt;BR /&gt;
 &lt;BR /&gt;
EDGE:SCRIPT-ENG-MEM-CORRUPT-93&lt;BR /&gt;
UPDATE-TYPE: New Signature&lt;BR /&gt;
CLASSIFICATION: BETA&lt;BR /&gt;
DESCRIPTION: A remote code execution vulnerability exists in the way that the Scripting Engine renders when handling objects in memory in Microsoft browsers. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
REFERENCE: URLREF&lt;BR /&gt;
&lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8629" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8629&lt;/A&gt;&lt;BR /&gt;
REFERENCE: CVE&lt;BR /&gt;
CVE-2018-8629&lt;BR /&gt;
 &lt;BR /&gt;
 &lt;BR /&gt;
EDGE:SCRIPT-ENG-MEM-CORRUPT-94&lt;BR /&gt;
UPDATE-TYPE: New Signature&lt;BR /&gt;
CLASSIFICATION: BETA&lt;BR /&gt;
DESCRIPTION: A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
REFERENCE: URLREF&lt;BR /&gt;
&lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8583" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8583&lt;/A&gt;&lt;BR /&gt;
REFERENCE: CVE&lt;BR /&gt;
CVE-2018-8583&lt;BR /&gt;
 &lt;BR /&gt;
 &lt;BR /&gt;
EDGE:SCRIPT-ENG-MEM-CORRUPT-95&lt;BR /&gt;
UPDATE-TYPE: New Signature&lt;BR /&gt;
CLASSIFICATION: BETA&lt;BR /&gt;
DESCRIPTION: A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
REFERENCE: URLREF&lt;BR /&gt;
&lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8618" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8618&lt;/A&gt;&lt;BR /&gt;
REFERENCE: CVE&lt;BR /&gt;
CVE-2018-8618&lt;BR /&gt;
 &lt;BR /&gt;
 &lt;BR /&gt;
IE:MEMORY-CORRUPTION-RCE-343&lt;BR /&gt;
UPDATE-TYPE: New Signature&lt;BR /&gt;
CLASSIFICATION: BETA&lt;BR /&gt;
DESCRIPTION: A remote code execution vulnerability exists when a Microsoft browser improperly accesses an object in memory. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
REFERENCE: URLREF&lt;BR /&gt;
&lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8631" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8631&lt;/A&gt;&lt;BR /&gt;
REFERENCE: CVE&lt;BR /&gt;
CVE-2018-8631&lt;BR /&gt;
 &lt;BR /&gt;
 &lt;BR /&gt;
IE:SCRIPTING-ENGINE-RCE-59&lt;BR /&gt;
UPDATE-TYPE: New Signature&lt;BR /&gt;
CLASSIFICATION: BETA&lt;BR /&gt;
DESCRIPTION: A remote code execution vulnerability exists in the way that the Scripting Engine renders when handling objects in memory in Microsoft browsers. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
REFERENCE: URLREF&lt;BR /&gt;
&lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8643" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8643&lt;/A&gt;&lt;BR /&gt;
REFERENCE: CVE&lt;BR /&gt;
CVE-2018-8643&lt;BR /&gt;
 &lt;BR /&gt;
 &lt;BR /&gt;
IE:SCRIPTING-ENGINE-RCE-60&lt;BR /&gt;
UPDATE-TYPE: New Signature&lt;BR /&gt;
CLASSIFICATION: BETA&lt;BR /&gt;
DESCRIPTION: A remote code execution vulnerability exists in Internet Explorer when the VBScript execution policy does not properly restrict VBScript under specific conditions. Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
REFERENCE: URLREF&lt;BR /&gt;
&lt;A href="https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2018-8619" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2018-8619&lt;/A&gt;&lt;BR /&gt;
REFERENCE: CVE&lt;BR /&gt;
CVE-2018-8619&lt;BR /&gt;
 &lt;BR /&gt;
 &lt;BR /&gt;
MS:TEXT-TO-SPEECH-RCE&lt;BR /&gt;
UPDATE-TYPE: New Signature&lt;BR /&gt;
CLASSIFICATION: BETA&lt;BR /&gt;
DESCRIPTION: A remote code execution vulnerability exists in Windows where Microsoft text-to-speech fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could take control of the affected system. Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
REFERENCE: URLREF&lt;BR /&gt;
&lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8634" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8634&lt;/A&gt;&lt;BR /&gt;
REFERENCE: CVE&lt;BR /&gt;
CVE-2018-8634&lt;BR /&gt;
 &lt;BR /&gt;
 &lt;BR /&gt;
MS:VBSCRIPT-ENGINE-RCE-4&lt;BR /&gt;
UPDATE-TYPE: New Signature&lt;BR /&gt;
CLASSIFICATION: BETA&lt;BR /&gt;
DESCRIPTION: A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
REFERENCE: URLREF&lt;BR /&gt;
&lt;A href="https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2018-8625" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2018-8625&lt;/A&gt;&lt;BR /&gt;
REFERENCE: CVE&lt;BR /&gt;
CVE-2018-8625</description>
      <pubDate>Wed, 12 Dec 2018 20:18:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/end-of-service-products/new-dragon-ips-signature-release-december-2018/m-p/24112#M472</guid>
      <dc:creator>Dudley__Jeff</dc:creator>
      <dc:date>2018-12-12T20:18:00Z</dc:date>
    </item>
    <item>
      <title>RE: New Dragon IPS signature release December 2018</title>
      <link>https://community.extremenetworks.com/t5/end-of-service-products/new-dragon-ips-signature-release-december-2018/m-p/24113#M473</link>
      <description>thank you for info</description>
      <pubDate>Wed, 17 Jul 2019 18:58:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/end-of-service-products/new-dragon-ips-signature-release-december-2018/m-p/24113#M473</guid>
      <dc:creator>strom_tr00per</dc:creator>
      <dc:date>2019-07-17T18:58:00Z</dc:date>
    </item>
  </channel>
</rss>

