[Emerging-updates] Daily Update Summary 27/12/2010

Matthew Jonkman jonkman at emergingthreatspro.com
Mon Dec 27 13:59:38 EST 2010


[+++]          Added rules:          [+++]

 2012101 - ET EXPLOIT Oracle Virtual Server Agent Command Injection Attempt (exploit.rules)
 2012102 - ET ACTIVEX Image Viewer CP Gold Image2PDF Buffer Overflow (activex.rules)
 2012103 - ET EXPLOIT D-Link bsc_wlan.php Security Bypass (exploit.rules)
 2012104 - ET USER_AGENTS Known Malware User-Agent AdVantage (user_agents.rules)
 2012105 - ET TROJAN AdVantage Malware URL Infection Report (trojan.rules)
 2801178 - ETPRO EXPLOIT Microsoft IIS FTP Server Telnet IAC Buffer Overflow (exploit.rules)
 2801179 - ETPRO ACTIVEX Microsoft Internet Explorer HTML Object Memory Corruption (activex.rules)
 2801180 - ETPRO TROJAN Koobface.D Checkin (trojan.rules)
 2801181 - ETPRO ACTIVEX SAP Crystal Reports PrintControl.dll ActiveX Control Buffer Overflow (activex.rules)


[///]     Modified active rules:     [///]

 2012075 - ET WEB_CLIENT Possible Internet Explorer CSS Parser Remote Code Execution Attempt (web_client.rules)
 2801176 - ETPRO WEB_CLIENT Internet Explorer IE CSS Multiple Dereference Exploit (web_client.rules)
 2801177 - ETPRO WEB_CLIENT Internet Explorer IE CSS Multiple Dereference Signature unicode (web_client.rules)

Reference adds only.




----------------------------------------------------
Matthew Jonkman
Emergingthreats.net
Emerging Threats Pro
Open Information Security Foundation (OISF)
Phone 765-807-8630
Fax 312-264-0205
http://www.emergingthreatspro.com
http://www.openinfosecfoundation.org
----------------------------------------------------

PGP: http://www.jonkmans.com/mattjonkman.asc





More information about the Emerging-updates mailing list