<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic New Dragon IPS signatures released. in End of Service Products</title>
    <link>https://community.extremenetworks.com/t5/end-of-service-products/new-dragon-ips-signatures-released/m-p/25193#M633</link>
    <description>The following NIDS signature updates are available via  liveupdate for Dragon versions 7.x/8.x:&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    EDGE:MEMORY-CORRUPTION-RCE-41&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code injection vulnerability exists  when Microsoft Edge incorrectly accesses certain objects in memory. Microsoft  has released a patch for this vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2017-8617" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2017-8617&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2017-8617&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    EDGE:SCRIPT-ENG-MEM-CORRUPT-36&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  in the way that the Scripting Engine renders when handling objects in memory in  Microsoft browsers. This vulnerability may corrupt memory in such a way that an  attacker could execute arbitrary code in the context of the current user.  Microsoft has released a patch for this  vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8598" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8598&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2017-8598&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    EDGE:SCRIPT-ENG-MEM-CORRUPT-37&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  in the way that the Scripting Engine renders when handling objects in memory in  Microsoft browsers. This vulnerability may corrupt memory in such a way that an  attacker could execute arbitrary code in the context of the current user.  Microsoft has released a patch for this  vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8601" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8601&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2017-8601&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    EDGE:SCRIPT-ENG-MEM-CORRUPT-38&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  in the way that the Scripting Engine renders when handling objects in memory in  Microsoft browsers. This vulnerability may corrupt memory in such a way that an  attacker could execute arbitrary code in the context of the current user.  Microsoft has released a patch for this  vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8605" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8605&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2017-8605&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    EDGE:SCRIPT-ENG-MEM-CORRUPT-39&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  in the way that the Scripting Engine renders when handling objects in memory in  Microsoft browsers. This vulnerability may corrupt memory in such a way that an  attacker could execute arbitrary code in the context of the current user.  Microsoft has released a patch for this  vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2017-8619" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2017-8619&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2017-8619&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    HTTP:MS-BROWSER-CORS-BYPASS&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A vulnerability in Microsoft Internet  Explorer and Microsoft Edge browsers allows for cross-origin resource sharing  (CORS) restrictions to be bypassed, potentially exposing sensitive data to a  third-party or attacker. Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8592" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8592&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2017-8592&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    IE:MEMORY-CORRUPTION-RCE-329&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code vulnerability exists when  Microsoft Internet Explorer renders certain HTML parameters. Microsoft has  released a patch for this vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8594" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8594&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2017-8594&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    IE:SCRIPTING-ENGINE-RCE-14&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  in the way that the Scripting Engine renders when handling objects in memory in  Microsoft browsers. This vulnerability may corrupt memory in such a way that an  attacker could execute arbitrary code in the context of the current user.  Microsoft has released a patch for this  vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2017-8618" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2017-8618&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2017-8618&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    &lt;BR /&gt;
&lt;BR /&gt;</description>
    <pubDate>Wed, 12 Jul 2017 17:19:00 GMT</pubDate>
    <dc:creator>Dudley__Jeff</dc:creator>
    <dc:date>2017-07-12T17:19:00Z</dc:date>
    <item>
      <title>New Dragon IPS signatures released.</title>
      <link>https://community.extremenetworks.com/t5/end-of-service-products/new-dragon-ips-signatures-released/m-p/25193#M633</link>
      <description>The following NIDS signature updates are available via  liveupdate for Dragon versions 7.x/8.x:&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    EDGE:MEMORY-CORRUPTION-RCE-41&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code injection vulnerability exists  when Microsoft Edge incorrectly accesses certain objects in memory. Microsoft  has released a patch for this vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2017-8617" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2017-8617&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2017-8617&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    EDGE:SCRIPT-ENG-MEM-CORRUPT-36&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  in the way that the Scripting Engine renders when handling objects in memory in  Microsoft browsers. This vulnerability may corrupt memory in such a way that an  attacker could execute arbitrary code in the context of the current user.  Microsoft has released a patch for this  vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8598" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8598&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2017-8598&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    EDGE:SCRIPT-ENG-MEM-CORRUPT-37&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  in the way that the Scripting Engine renders when handling objects in memory in  Microsoft browsers. This vulnerability may corrupt memory in such a way that an  attacker could execute arbitrary code in the context of the current user.  Microsoft has released a patch for this  vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8601" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8601&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2017-8601&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    EDGE:SCRIPT-ENG-MEM-CORRUPT-38&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  in the way that the Scripting Engine renders when handling objects in memory in  Microsoft browsers. This vulnerability may corrupt memory in such a way that an  attacker could execute arbitrary code in the context of the current user.  Microsoft has released a patch for this  vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8605" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8605&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2017-8605&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    EDGE:SCRIPT-ENG-MEM-CORRUPT-39&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  in the way that the Scripting Engine renders when handling objects in memory in  Microsoft browsers. This vulnerability may corrupt memory in such a way that an  attacker could execute arbitrary code in the context of the current user.  Microsoft has released a patch for this  vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2017-8619" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2017-8619&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2017-8619&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    HTTP:MS-BROWSER-CORS-BYPASS&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A vulnerability in Microsoft Internet  Explorer and Microsoft Edge browsers allows for cross-origin resource sharing  (CORS) restrictions to be bypassed, potentially exposing sensitive data to a  third-party or attacker. Microsoft has released a patch for this vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8592" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8592&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2017-8592&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    IE:MEMORY-CORRUPTION-RCE-329&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code vulnerability exists when  Microsoft Internet Explorer renders certain HTML parameters. Microsoft has  released a patch for this vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8594" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8594&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2017-8594&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    IE:SCRIPTING-ENGINE-RCE-14&lt;BR /&gt;
&lt;BR /&gt;
    UPDATE-TYPE: New Signature&lt;BR /&gt;
&lt;BR /&gt;
    CLASSIFICATION: BETA&lt;BR /&gt;
&lt;BR /&gt;
    DESCRIPTION: A remote code execution vulnerability exists  in the way that the Scripting Engine renders when handling objects in memory in  Microsoft browsers. This vulnerability may corrupt memory in such a way that an  attacker could execute arbitrary code in the context of the current user.  Microsoft has released a patch for this  vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: URLREF&lt;BR /&gt;
&lt;BR /&gt;
    &lt;A href="https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2017-8618" target="_blank" rel="nofollow noreferrer noopener"&gt;https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2017-8618&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
    REFERENCE: CVE&lt;BR /&gt;
&lt;BR /&gt;
    CVE-2017-8618&lt;BR /&gt;
&lt;BR /&gt;
     &lt;BR /&gt;
&lt;BR /&gt;
    &lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Wed, 12 Jul 2017 17:19:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/end-of-service-products/new-dragon-ips-signatures-released/m-p/25193#M633</guid>
      <dc:creator>Dudley__Jeff</dc:creator>
      <dc:date>2017-07-12T17:19:00Z</dc:date>
    </item>
  </channel>
</rss>

