<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Threat detections of &amp;quot;Canonical ksmbd-tools ksmbd.mountd ndrwritebytes Heap Buffer Overflow Vulnerability(94951)&amp;quot; in Windows server traf in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/threat-detections-of-quot-canonical-ksmbd-tools-ksmbd-mountd/m-p/579825#M2796</link>
    <description>&lt;P&gt;Tnx for your help. I'll start that process.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 08 Mar 2024 21:00:25 GMT</pubDate>
    <dc:creator>Megawatt</dc:creator>
    <dc:date>2024-03-08T21:00:25Z</dc:date>
    <item>
      <title>Threat detections of "Canonical ksmbd-tools ksmbd.mountd ndrwritebytes Heap Buffer Overflow Vulnerability(94951)" in Windows server traffic</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/threat-detections-of-quot-canonical-ksmbd-tools-ksmbd-mountd/m-p/579794#M2782</link>
      <description>&lt;P&gt;&lt;SPAN class="t"&gt;Anyone else seeing the following alerts:&lt;BR /&gt;tcp&lt;/SPAN&gt;&lt;SPAN&gt;,&lt;/SPAN&gt;&lt;SPAN class="t"&gt;alert&lt;/SPAN&gt;&lt;SPAN&gt;,"&lt;/SPAN&gt;&lt;SPAN class="t"&gt;gpt.ini&lt;/SPAN&gt;&lt;SPAN&gt;",&lt;/SPAN&gt;&lt;SPAN class="t a"&gt;&lt;SPAN class="t"&gt;Canonical&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="t"&gt;ksmbd-tools&lt;/SPAN&gt; &lt;SPAN class="t"&gt;ksmbd.mountd&lt;/SPAN&gt; &lt;SPAN class="t"&gt;ndrwritebytes&lt;/SPAN&gt; &lt;SPAN class="t"&gt;Heap&lt;/SPAN&gt; &lt;SPAN class="t"&gt;Buffer&lt;/SPAN&gt; &lt;SPAN class="t"&gt;Overflow&lt;/SPAN&gt; &lt;SPAN class="t"&gt;Vulnerability&lt;/SPAN&gt;&lt;SPAN&gt;(&lt;/SPAN&gt;&lt;SPAN class="t"&gt;94951&lt;/SPAN&gt;&lt;SPAN&gt;)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;But this is being detected in traffic between 2 Windows server, so it doesn't make sense. Seems to be a false positive. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Mar 2024 14:01:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/threat-detections-of-quot-canonical-ksmbd-tools-ksmbd-mountd/m-p/579794#M2782</guid>
      <dc:creator>Megawatt</dc:creator>
      <dc:date>2024-03-08T14:01:19Z</dc:date>
    </item>
    <item>
      <title>Re: Threat detections of "Canonical ksmbd-tools ksmbd.mountd ndrwritebytes Heap Buffer Overflow Vulnerability(94951)" in Windows server traf</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/threat-detections-of-quot-canonical-ksmbd-tools-ksmbd-mountd/m-p/579801#M2784</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I at least am not seeing this in our environment. Why does it being flagged between two servers lead to believe its a false positive?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you want to create an exception you can do so from this and specify the specific IPs for exception as opposed to changing the action for the entire ID.&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Cm4yCAC" target="_blank"&gt;How to create a vulnerability exception - Knowledge Base - Palo Alto Networks&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Palo Vault of ID:&amp;nbsp;&lt;SPAN&gt;&lt;A href="https://threatvault.paloaltonetworks.com/?query=94951&amp;amp;type=" target="_blank"&gt;https://threatvault.paloaltonetworks.com/?query=94951&amp;amp;type=&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Mar 2024 15:55:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/threat-detections-of-quot-canonical-ksmbd-tools-ksmbd-mountd/m-p/579801#M2784</guid>
      <dc:creator>Claw4609</dc:creator>
      <dc:date>2024-03-08T15:55:35Z</dc:date>
    </item>
    <item>
      <title>Re: Threat detections of "Canonical ksmbd-tools ksmbd.mountd ndrwritebytes Heap Buffer Overflow Vulnerability(94951)" in Windows server traf</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/threat-detections-of-quot-canonical-ksmbd-tools-ksmbd-mountd/m-p/579805#M2786</link>
      <description>&lt;P&gt;Because the source and destination are both Windows servers. This detection relates to a vulnerability in a Linux module (related to SMB I believe).&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Mar 2024 17:01:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/threat-detections-of-quot-canonical-ksmbd-tools-ksmbd-mountd/m-p/579805#M2786</guid>
      <dc:creator>Megawatt</dc:creator>
      <dc:date>2024-03-08T17:01:50Z</dc:date>
    </item>
    <item>
      <title>Re: Threat detections of "Canonical ksmbd-tools ksmbd.mountd ndrwritebytes Heap Buffer Overflow Vulnerability(94951)" in Windows server traf</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/threat-detections-of-quot-canonical-ksmbd-tools-ksmbd-mountd/m-p/579808#M2787</link>
      <description>&lt;P&gt;Gotcha, would help if I read that closer. While it technically would be possible to run Ubuntu and those tools within a Windows server, it sounds like its probably a false positive. If thats the case you can submit a TAC case for them to look into the information and update the signature as needed.&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClSBCA0" target="_blank"&gt;How to Submit a Vulnerability Signature False Positive - Knowledge Base - Palo Alto Networks&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Mar 2024 17:20:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/threat-detections-of-quot-canonical-ksmbd-tools-ksmbd-mountd/m-p/579808#M2787</guid>
      <dc:creator>Claw4609</dc:creator>
      <dc:date>2024-03-08T17:20:21Z</dc:date>
    </item>
    <item>
      <title>Re: Threat detections of "Canonical ksmbd-tools ksmbd.mountd ndrwritebytes Heap Buffer Overflow Vulnerability(94951)" in Windows server traf</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/threat-detections-of-quot-canonical-ksmbd-tools-ksmbd-mountd/m-p/579825#M2796</link>
      <description>&lt;P&gt;Tnx for your help. I'll start that process.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Mar 2024 21:00:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/threat-detections-of-quot-canonical-ksmbd-tools-ksmbd-mountd/m-p/579825#M2796</guid>
      <dc:creator>Megawatt</dc:creator>
      <dc:date>2024-03-08T21:00:25Z</dc:date>
    </item>
    <item>
      <title>Re: Threat detections of "Canonical ksmbd-tools ksmbd.mountd ndrwritebytes Heap Buffer Overflow Vulnerability(94951)" in Windows server traf</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/threat-detections-of-quot-canonical-ksmbd-tools-ksmbd-mountd/m-p/579856#M2800</link>
      <description>&lt;P&gt; &lt;/P&gt;
&lt;P&gt;Well, it seems that PA released an updated detection for this in the latest release (see attached image). Fingers crossed that this resolves it. I'll circle back here if I no longer see detections.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="IMG_5853.jpeg" style="width: 320px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/58182iE9C9980A95FDC485/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="IMG_5853.jpeg" alt="IMG_5853.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2024 00:50:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/threat-detections-of-quot-canonical-ksmbd-tools-ksmbd-mountd/m-p/579856#M2800</guid>
      <dc:creator>Megawatt</dc:creator>
      <dc:date>2024-03-10T00:50:40Z</dc:date>
    </item>
  </channel>
</rss>

