<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic New Dragon IPS signature release. in End of Service Products</title>
    <link>https://community.extremenetworks.com/t5/end-of-service-products/new-dragon-ips-signature-release/m-p/25029#M602</link>
    <description>The following NIDS signature updates are available via  liveupdate for Dragon versions 7.x/8.x:&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    IIS:WEBDAV-REMOTE-CODE&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: There is a vulnerability in the Microsoft  IIS server on Windows XP and Windows 2003 that may lead to remote code  execution. The vulnerability is in the processing of specific HTTP headers  within IIS. Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="http://github.com/edwardz246003/IIS_exploit/blob/master/exploit.py" target="_blank" rel="nofollow noreferrer noopener"&gt;http://github.com/edwardz246003/IIS_exploit/blob/master/exploit.py&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://support.microsoft.com/en-us/help/3197835/description-of-the-security-update-for-windows-xp-and-windows-server" target="_blank" rel="nofollow noreferrer noopener"&gt;https://support.microsoft.com/en-us/help/3197835/description-of-the-security-update-for-windows-xp-and-windows-server&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="http://docs.emergingthreats.net/2024107" target="_blank" rel="nofollow noreferrer noopener"&gt;http://docs.emergingthreats.net/2024107&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2017-7269&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    MS:KERBEROS-PRIV-ESCAL&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A privilege escalation vulnerability exists  within Microsoft Windows Kerberos that allows for domain user to elevate to a  domain administrator. Microsoft has released a patch for this vulnerability.  This signature looks for pykek toolkit being used to exploit this  vulnerability. &lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://technet.microsoft.com/en-us/library/security/ms14-068.aspx" target="_blank" rel="nofollow noreferrer noopener"&gt;https://technet.microsoft.com/en-us/library/security/ms14-068.aspx&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="http://github.com/bidord/pykek" target="_blank" rel="nofollow noreferrer noopener"&gt;http://github.com/bidord/pykek&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="http://docs.emergingthreats.net/2019897" target="_blank" rel="nofollow noreferrer noopener"&gt;http://docs.emergingthreats.net/2019897&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2014-6324&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    MS:KERBEROS-PRIV-ESCAL-2&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A privilege escalation vulnerability exists  within Microsoft Windows Kerberos that allows for domain user to elevate to a  domain administrator. Microsoft has released a patch for this vulnerability.  This signature looks for impacket being used to exploit this vulnerability. &lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://technet.microsoft.com/en-us/library/security/ms14-068.aspx" target="_blank" rel="nofollow noreferrer noopener"&gt;https://technet.microsoft.com/en-us/library/security/ms14-068.aspx&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="http://code.google.com/p/impacket/source/browse/trunk/examples/goldenPac.py" target="_blank" rel="nofollow noreferrer noopener"&gt;http://code.google.com/p/impacket/source/browse/trunk/examples/goldenPac.py&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="http://docs.emergingthreats.net/2019922" target="_blank" rel="nofollow noreferrer noopener"&gt;http://docs.emergingthreats.net/2019922&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2014-6324&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    MS:SMB-REQUEST-REMOTE&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: There is a vulnerability in Microsoft  Windows that may lead to remote code execution. The vulnerability is in the  processing of SMB packets. Microsoft has released a patch (MS17-010) for this  vulnerability. The vulnerability is also being used in ransomeware attacks,  including WannaCry.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://technet.microsoft.com/en-us/library/security/ms17-010.aspx/" target="_blank" rel="nofollow noreferrer noopener"&gt;https://technet.microsoft.com/en-us/library/security/ms17-010.aspx/&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="http://docs.emergingthreats.net/2024297" target="_blank" rel="nofollow noreferrer noopener"&gt;http://docs.emergingthreats.net/2024297&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2017-0143&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    MS:SMB2-PROCESSID-NEGOTIATE&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: There is a vulnerability in Microsoft  Windows that may lead to remote code execution. The vulnerability is in the  processing of SMBv2 packets. Microsoft has released a patch (MS09-050) for this  vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="http://www.exploit-db.com/exploits/14674/" target="_blank" rel="nofollow noreferrer noopener"&gt;http://www.exploit-db.com/exploits/14674/&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="http://www.microsoft.com/technet/security/bulletin/ms09-050.mspx" target="_blank" rel="nofollow noreferrer noopener"&gt;http://www.microsoft.com/technet/security/bulletin/ms09-050.mspx&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="http://docs.emergingthreats.net/2012063" target="_blank" rel="nofollow noreferrer noopener"&gt;http://docs.emergingthreats.net/2012063&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2009-3103&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    MS:SMBV1-REQUEST-REMOTE&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: Modified Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: There is a vulnerability in Microsoft  Windows that may lead to remote code execution. The vulnerability is in the  processing of SMB packets. Microsoft has released a patch (MS17-010) for this  vulnerability. The vulnerability is also being used in ransomeware attacks,  including WannaCry.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://technet.microsoft.com/en-us/library/security/ms17-010.aspx/" target="_blank" rel="nofollow noreferrer noopener"&gt;https://technet.microsoft.com/en-us/library/security/ms17-010.aspx/&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="http://docs.emergingthreats.net/2024217" target="_blank" rel="nofollow noreferrer noopener"&gt;http://docs.emergingthreats.net/2024217&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2017-0144&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    MS:SMBV1-REQUEST-REMOTE2&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: Modified Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: There is a vulnerability in Microsoft  Windows that may lead to remote code execution. The vulnerability is in the  processing of SMB packets. Microsoft has released a patch (MS17-010) for this  vulnerability. The vulnerability is also being used in ransomeware attacks,  including WannaCry. There are other signatures that depend on this signature  being enabled.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://technet.microsoft.com/en-us/library/security/ms17-010.aspx/" target="_blank" rel="nofollow noreferrer noopener"&gt;https://technet.microsoft.com/en-us/library/security/ms17-010.aspx/&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="http://docs.emergingthreats.net/2024220" target="_blank" rel="nofollow noreferrer noopener"&gt;http://docs.emergingthreats.net/2024220&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2017-0144&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    MS:SMBV1-RESPONSE-REMOTE&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: Modified Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: There is a vulnerability in Microsoft  Windows that may lead to remote code execution. The vulnerability is in the  processing of SMB packets. Microsoft has released a patch (MS17-010) for this  vulnerability. The vulnerability is also being used in ransomeware attacks,  including WannaCry. This signature tests for the "smbv1.remote"  FlowTag being set before generating an event on network traffic. This FlowTag  is defined by the MS:SMBV1-REQUEST-REMOTE signature, which is required for this  signature to generate an event.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://technet.microsoft.com/en-us/library/security/ms17-010.aspx/" target="_blank" rel="nofollow noreferrer noopener"&gt;https://technet.microsoft.com/en-us/library/security/ms17-010.aspx/&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="http://docs.emergingthreats.net/2024218" target="_blank" rel="nofollow noreferrer noopener"&gt;http://docs.emergingthreats.net/2024218&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2017-0144&lt;BR /&gt;
&lt;BR /&gt;
    &lt;BR /&gt;
&lt;BR /&gt;</description>
    <pubDate>Wed, 28 Jun 2017 15:41:00 GMT</pubDate>
    <dc:creator>Dudley__Jeff</dc:creator>
    <dc:date>2017-06-28T15:41:00Z</dc:date>
    <item>
      <title>New Dragon IPS signature release.</title>
      <link>https://community.extremenetworks.com/t5/end-of-service-products/new-dragon-ips-signature-release/m-p/25029#M602</link>
      <description>The following NIDS signature updates are available via  liveupdate for Dragon versions 7.x/8.x:&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    IIS:WEBDAV-REMOTE-CODE&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: There is a vulnerability in the Microsoft  IIS server on Windows XP and Windows 2003 that may lead to remote code  execution. The vulnerability is in the processing of specific HTTP headers  within IIS. Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="http://github.com/edwardz246003/IIS_exploit/blob/master/exploit.py" target="_blank" rel="nofollow noreferrer noopener"&gt;http://github.com/edwardz246003/IIS_exploit/blob/master/exploit.py&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://support.microsoft.com/en-us/help/3197835/description-of-the-security-update-for-windows-xp-and-windows-server" target="_blank" rel="nofollow noreferrer noopener"&gt;https://support.microsoft.com/en-us/help/3197835/description-of-the-security-update-for-windows-xp-and-windows-server&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="http://docs.emergingthreats.net/2024107" target="_blank" rel="nofollow noreferrer noopener"&gt;http://docs.emergingthreats.net/2024107&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2017-7269&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    MS:KERBEROS-PRIV-ESCAL&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A privilege escalation vulnerability exists  within Microsoft Windows Kerberos that allows for domain user to elevate to a  domain administrator. Microsoft has released a patch for this vulnerability.  This signature looks for pykek toolkit being used to exploit this  vulnerability. &lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://technet.microsoft.com/en-us/library/security/ms14-068.aspx" target="_blank" rel="nofollow noreferrer noopener"&gt;https://technet.microsoft.com/en-us/library/security/ms14-068.aspx&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="http://github.com/bidord/pykek" target="_blank" rel="nofollow noreferrer noopener"&gt;http://github.com/bidord/pykek&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="http://docs.emergingthreats.net/2019897" target="_blank" rel="nofollow noreferrer noopener"&gt;http://docs.emergingthreats.net/2019897&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2014-6324&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    MS:KERBEROS-PRIV-ESCAL-2&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A privilege escalation vulnerability exists  within Microsoft Windows Kerberos that allows for domain user to elevate to a  domain administrator. Microsoft has released a patch for this vulnerability.  This signature looks for impacket being used to exploit this vulnerability. &lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://technet.microsoft.com/en-us/library/security/ms14-068.aspx" target="_blank" rel="nofollow noreferrer noopener"&gt;https://technet.microsoft.com/en-us/library/security/ms14-068.aspx&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="http://code.google.com/p/impacket/source/browse/trunk/examples/goldenPac.py" target="_blank" rel="nofollow noreferrer noopener"&gt;http://code.google.com/p/impacket/source/browse/trunk/examples/goldenPac.py&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="http://docs.emergingthreats.net/2019922" target="_blank" rel="nofollow noreferrer noopener"&gt;http://docs.emergingthreats.net/2019922&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2014-6324&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    MS:SMB-REQUEST-REMOTE&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: There is a vulnerability in Microsoft  Windows that may lead to remote code execution. The vulnerability is in the  processing of SMB packets. Microsoft has released a patch (MS17-010) for this  vulnerability. The vulnerability is also being used in ransomeware attacks,  including WannaCry.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://technet.microsoft.com/en-us/library/security/ms17-010.aspx/" target="_blank" rel="nofollow noreferrer noopener"&gt;https://technet.microsoft.com/en-us/library/security/ms17-010.aspx/&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="http://docs.emergingthreats.net/2024297" target="_blank" rel="nofollow noreferrer noopener"&gt;http://docs.emergingthreats.net/2024297&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2017-0143&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    MS:SMB2-PROCESSID-NEGOTIATE&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: There is a vulnerability in Microsoft  Windows that may lead to remote code execution. The vulnerability is in the  processing of SMBv2 packets. Microsoft has released a patch (MS09-050) for this  vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="http://www.exploit-db.com/exploits/14674/" target="_blank" rel="nofollow noreferrer noopener"&gt;http://www.exploit-db.com/exploits/14674/&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="http://www.microsoft.com/technet/security/bulletin/ms09-050.mspx" target="_blank" rel="nofollow noreferrer noopener"&gt;http://www.microsoft.com/technet/security/bulletin/ms09-050.mspx&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="http://docs.emergingthreats.net/2012063" target="_blank" rel="nofollow noreferrer noopener"&gt;http://docs.emergingthreats.net/2012063&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2009-3103&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    MS:SMBV1-REQUEST-REMOTE&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: Modified Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: There is a vulnerability in Microsoft  Windows that may lead to remote code execution. The vulnerability is in the  processing of SMB packets. Microsoft has released a patch (MS17-010) for this  vulnerability. The vulnerability is also being used in ransomeware attacks,  including WannaCry.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://technet.microsoft.com/en-us/library/security/ms17-010.aspx/" target="_blank" rel="nofollow noreferrer noopener"&gt;https://technet.microsoft.com/en-us/library/security/ms17-010.aspx/&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="http://docs.emergingthreats.net/2024217" target="_blank" rel="nofollow noreferrer noopener"&gt;http://docs.emergingthreats.net/2024217&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2017-0144&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    MS:SMBV1-REQUEST-REMOTE2&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: Modified Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: There is a vulnerability in Microsoft  Windows that may lead to remote code execution. The vulnerability is in the  processing of SMB packets. Microsoft has released a patch (MS17-010) for this  vulnerability. The vulnerability is also being used in ransomeware attacks,  including WannaCry. There are other signatures that depend on this signature  being enabled.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://technet.microsoft.com/en-us/library/security/ms17-010.aspx/" target="_blank" rel="nofollow noreferrer noopener"&gt;https://technet.microsoft.com/en-us/library/security/ms17-010.aspx/&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="http://docs.emergingthreats.net/2024220" target="_blank" rel="nofollow noreferrer noopener"&gt;http://docs.emergingthreats.net/2024220&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2017-0144&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    MS:SMBV1-RESPONSE-REMOTE&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: Modified Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: There is a vulnerability in Microsoft  Windows that may lead to remote code execution. The vulnerability is in the  processing of SMB packets. Microsoft has released a patch (MS17-010) for this  vulnerability. The vulnerability is also being used in ransomeware attacks,  including WannaCry. This signature tests for the "smbv1.remote"  FlowTag being set before generating an event on network traffic. This FlowTag  is defined by the MS:SMBV1-REQUEST-REMOTE signature, which is required for this  signature to generate an event.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://technet.microsoft.com/en-us/library/security/ms17-010.aspx/" target="_blank" rel="nofollow noreferrer noopener"&gt;https://technet.microsoft.com/en-us/library/security/ms17-010.aspx/&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="http://docs.emergingthreats.net/2024218" target="_blank" rel="nofollow noreferrer noopener"&gt;http://docs.emergingthreats.net/2024218&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2017-0144&lt;BR /&gt;
&lt;BR /&gt;
    &lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Wed, 28 Jun 2017 15:41:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/end-of-service-products/new-dragon-ips-signature-release/m-p/25029#M602</guid>
      <dc:creator>Dudley__Jeff</dc:creator>
      <dc:date>2017-06-28T15:41:00Z</dc:date>
    </item>
  </channel>
</rss>

