<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Help with Microsoft DCE RPC Big Endian Evasion Vulnerability 33510 in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/help-with-microsoft-dce-rpc-big-endian-evasion-vulnerability/m-p/230735#M402</link>
    <description>&lt;P&gt;I have Googled this and read up on numerous links, but I cannot find anything of value on this threatID.&amp;nbsp; I have 30-40 events a day from various IP addresses on my network, usually 1 event per IP, sometimes 2 events.&amp;nbsp; I have scanned several of the PC's with 3 different popular scanners, nothing found. I have monitored the traffic from the PCs and nothing is talking to suspicious IP addresses.&amp;nbsp; I cannot find a specific Microsoft patch associated with this vulnerability.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any thoughts on this? false positive? Is there a MS patch to ensure my systems aren't vulnerable?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
    <pubDate>Thu, 13 Sep 2018 15:42:01 GMT</pubDate>
    <dc:creator>smc007</dc:creator>
    <dc:date>2018-09-13T15:42:01Z</dc:date>
    <item>
      <title>Help with Microsoft DCE RPC Big Endian Evasion Vulnerability 33510</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/help-with-microsoft-dce-rpc-big-endian-evasion-vulnerability/m-p/230735#M402</link>
      <description>&lt;P&gt;I have Googled this and read up on numerous links, but I cannot find anything of value on this threatID.&amp;nbsp; I have 30-40 events a day from various IP addresses on my network, usually 1 event per IP, sometimes 2 events.&amp;nbsp; I have scanned several of the PC's with 3 different popular scanners, nothing found. I have monitored the traffic from the PCs and nothing is talking to suspicious IP addresses.&amp;nbsp; I cannot find a specific Microsoft patch associated with this vulnerability.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any thoughts on this? false positive? Is there a MS patch to ensure my systems aren't vulnerable?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Sep 2018 15:42:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/help-with-microsoft-dce-rpc-big-endian-evasion-vulnerability/m-p/230735#M402</guid>
      <dc:creator>smc007</dc:creator>
      <dc:date>2018-09-13T15:42:01Z</dc:date>
    </item>
    <item>
      <title>Re: Help with Microsoft DCE RPC Big Endian Evasion Vulnerability 33510</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/help-with-microsoft-dce-rpc-big-endian-evasion-vulnerability/m-p/231230#M412</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;While it could be a false positive, it might not be ( tough to say).&amp;nbsp; I would suggest gathering a pcap and see what is actually going on. PAN support can assist if you need them to. Also make sure the following is installed:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.rapid7.com/db/vulnerabilities/dcerpc-ms-emapper-bof" target="_blank"&gt;https://www.rapid7.com/db/vulnerabilities/dcerpc-ms-emapper-bof&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also in my experience, I block anything meduium or higher.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Sep 2018 14:38:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/help-with-microsoft-dce-rpc-big-endian-evasion-vulnerability/m-p/231230#M412</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2018-09-18T14:38:51Z</dc:date>
    </item>
  </channel>
</rss>

