<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic New Dragon IPS signature release in End of Service Products</title>
    <link>https://community.extremenetworks.com/t5/end-of-service-products/new-dragon-ips-signature-release/m-p/24892#M578</link>
    <description>The following NIDS signature updates are available via&lt;BR /&gt;
liveupdate for Dragon versions 7.x/8.x:&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    EDGE:CHAKRA-SCRIPT10&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  when Microsoft Edge improperly accesses an object in memory. This vulnerability  may corrupt memory in such a way that an attacker could execute arbitrary code  in the context of the current user. Microsoft has released a patch for this  vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2018-8588" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2018-8588&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2018-8588&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    EDGE:CHAKRA-SCRIPT8&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  when Microsoft Edge improperly accesses an object in memory. This vulnerability  may corrupt memory in such a way that an attacker could execute arbitrary code  in the context of the current user. Microsoft has released a patch for this  vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2018-8556" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2018-8556&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2018-8556&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    EDGE:CHAKRA-SCRIPT9&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  when Microsoft Edge improperly accesses an object in memory. This vulnerability  may corrupt memory in such a way that an attacker could execute arbitrary code  in the context of the current user. Microsoft has released a patch for this  vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2018-8557" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2018-8557&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2018-8557&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    EDGE:INFO-DISCLOSURE12&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: An information disclosure vulnerability  exists when Microsoft Edge improperly handles objects in memory. An attacker  who exploited this vulnerability could obtain information to further compromise  the users system. Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8545" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8545&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2018-8545&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    EDGE:SCRIPT-ENG-MEM-CORRUPT-91&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  in the way that the Scripting Engine renders when handling objects in memory in  Microsoft browsers. This vulnerability may corrupt memory in such a way that an  attacker could execute arbitrary code in the context of the current user.  Microsoft has released a patch for this  vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8542" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8542&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2018-8542&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    EDGE:SCRIPT-ENG-MEM-CORRUPT-92&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  in the way that the Scripting Engine renders when handling objects in memory in  Microsoft browsers. This vulnerability may corrupt memory in such a way that an  attacker could execute arbitrary code in the context of the current user.  Microsoft has released a patch for this  vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8555" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8555&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2018-8555&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    IE:INFO-DISCLOSURE11&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: An information disclosure vulnerability  exists when a Microsoft browser incorrectly handles objects in memory.  Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8552" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8552&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2018-8552&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    MS:DIRECTX-INFO-DISCLOSURE&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: An information disclosure vulnerability  exists when DirectX improperly accesses objects in memory. This vulnerability  may allow an attacker to obtain information to compromise a user's system.  Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2018-8563" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2018-8563&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2018-8563&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    MS:OUTLOOK-RULEFILE&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  in Microsoft Outlook software when it failed to properly handle objects in  memory. An attacker who successfully exploited the vulnerability could use a  specially crafted file to perform actions in the security context of the  current user. Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8522" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8522&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2018-8522&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    MS:OUTLOOK-RULEFILE-2&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  in Microsoft Outlook software when it failed to properly handle objects in  memory. An attacker who successfully exploited the vulnerability could use a  specially crafted file to perform actions in the security context of the  current user. Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8582" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8582&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2018-8582&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    MS:VBSCRIPT-ENGINE-RCE-3&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  in a Microsoft browser when the VBScript engine improperly handles objects in  memory. This vulnerability may corrupt memory in such a way that an attacker  could execute arbitrary code in the context of the current user. Microsoft has  released a patch for this vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8544" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8544&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2018-8544&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    MS:WIN-GRAPHICS-WMF-RCE&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  in the way that Microsoft Graphics Components handle objects in memory. An  attacker who successfully exploited the vulnerability could execute arbitrary  code on a target system. Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8553" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8553&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2018-8553&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    MS:WORD-REMOTE-CODE-EXE&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  in Microsoft Word software when it fails to properly handle objects in memory.  An attacker who successfully exploited the vulnerability could use a specially  crafted file to perform actions in the security context of the current user.  Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8539" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8539&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2018-8539&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    TFTP:WINDOWS-DEPLOYMENT-RCE&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  in the way that Windows Deployment Services TFTP Server handles objects in  memory. An attacker who successfully exploited the vulnerability could execute  arbitrary code with elevated permissions on a target system. Microsoft has  released a patch for this vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8476" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8476&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2018-8476&lt;BR /&gt;
&lt;BR /&gt;
    &lt;BR /&gt;
&lt;BR /&gt;</description>
    <pubDate>Wed, 14 Nov 2018 19:36:00 GMT</pubDate>
    <dc:creator>Dudley__Jeff</dc:creator>
    <dc:date>2018-11-14T19:36:00Z</dc:date>
    <item>
      <title>New Dragon IPS signature release</title>
      <link>https://community.extremenetworks.com/t5/end-of-service-products/new-dragon-ips-signature-release/m-p/24892#M578</link>
      <description>The following NIDS signature updates are available via&lt;BR /&gt;
liveupdate for Dragon versions 7.x/8.x:&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    EDGE:CHAKRA-SCRIPT10&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  when Microsoft Edge improperly accesses an object in memory. This vulnerability  may corrupt memory in such a way that an attacker could execute arbitrary code  in the context of the current user. Microsoft has released a patch for this  vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2018-8588" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2018-8588&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2018-8588&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    EDGE:CHAKRA-SCRIPT8&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  when Microsoft Edge improperly accesses an object in memory. This vulnerability  may corrupt memory in such a way that an attacker could execute arbitrary code  in the context of the current user. Microsoft has released a patch for this  vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2018-8556" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2018-8556&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2018-8556&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    EDGE:CHAKRA-SCRIPT9&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  when Microsoft Edge improperly accesses an object in memory. This vulnerability  may corrupt memory in such a way that an attacker could execute arbitrary code  in the context of the current user. Microsoft has released a patch for this  vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2018-8557" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2018-8557&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2018-8557&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    EDGE:INFO-DISCLOSURE12&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: An information disclosure vulnerability  exists when Microsoft Edge improperly handles objects in memory. An attacker  who exploited this vulnerability could obtain information to further compromise  the users system. Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8545" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8545&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2018-8545&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    EDGE:SCRIPT-ENG-MEM-CORRUPT-91&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  in the way that the Scripting Engine renders when handling objects in memory in  Microsoft browsers. This vulnerability may corrupt memory in such a way that an  attacker could execute arbitrary code in the context of the current user.  Microsoft has released a patch for this  vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8542" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8542&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2018-8542&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    EDGE:SCRIPT-ENG-MEM-CORRUPT-92&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  in the way that the Scripting Engine renders when handling objects in memory in  Microsoft browsers. This vulnerability may corrupt memory in such a way that an  attacker could execute arbitrary code in the context of the current user.  Microsoft has released a patch for this  vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8555" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8555&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2018-8555&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    IE:INFO-DISCLOSURE11&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: An information disclosure vulnerability  exists when a Microsoft browser incorrectly handles objects in memory.  Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8552" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8552&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2018-8552&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    MS:DIRECTX-INFO-DISCLOSURE&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: An information disclosure vulnerability  exists when DirectX improperly accesses objects in memory. This vulnerability  may allow an attacker to obtain information to compromise a user's system.  Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2018-8563" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2018-8563&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2018-8563&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    MS:OUTLOOK-RULEFILE&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  in Microsoft Outlook software when it failed to properly handle objects in  memory. An attacker who successfully exploited the vulnerability could use a  specially crafted file to perform actions in the security context of the  current user. Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8522" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8522&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2018-8522&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    MS:OUTLOOK-RULEFILE-2&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  in Microsoft Outlook software when it failed to properly handle objects in  memory. An attacker who successfully exploited the vulnerability could use a  specially crafted file to perform actions in the security context of the  current user. Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8582" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8582&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2018-8582&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    MS:VBSCRIPT-ENGINE-RCE-3&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  in a Microsoft browser when the VBScript engine improperly handles objects in  memory. This vulnerability may corrupt memory in such a way that an attacker  could execute arbitrary code in the context of the current user. Microsoft has  released a patch for this vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8544" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8544&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2018-8544&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    MS:WIN-GRAPHICS-WMF-RCE&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  in the way that Microsoft Graphics Components handle objects in memory. An  attacker who successfully exploited the vulnerability could execute arbitrary  code on a target system. Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8553" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8553&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2018-8553&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    MS:WORD-REMOTE-CODE-EXE&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  in Microsoft Word software when it fails to properly handle objects in memory.  An attacker who successfully exploited the vulnerability could use a specially  crafted file to perform actions in the security context of the current user.  Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8539" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8539&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2018-8539&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    TFTP:WINDOWS-DEPLOYMENT-RCE&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  in the way that Windows Deployment Services TFTP Server handles objects in  memory. An attacker who successfully exploited the vulnerability could execute  arbitrary code with elevated permissions on a target system. Microsoft has  released a patch for this vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8476" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8476&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2018-8476&lt;BR /&gt;
&lt;BR /&gt;
    &lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Wed, 14 Nov 2018 19:36:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/end-of-service-products/new-dragon-ips-signature-release/m-p/24892#M578</guid>
      <dc:creator>Dudley__Jeff</dc:creator>
      <dc:date>2018-11-14T19:36:00Z</dc:date>
    </item>
  </channel>
</rss>

