<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CVE-2019-0708 Remote Desktop Services Remote Code Execution Vulnerability - Expected Signature in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cve-2019-0708-remote-desktop-services-remote-code-execution/m-p/261875#M563</link>
    <description>Sorry! &lt;BR /&gt;Released in content 8154.</description>
    <pubDate>Wed, 22 May 2019 00:11:42 GMT</pubDate>
    <dc:creator>ssullivan</dc:creator>
    <dc:date>2019-05-22T00:11:42Z</dc:date>
    <item>
      <title>CVE-2019-0708 Remote Desktop Services Remote Code Execution Vulnerability - Expected Signature</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cve-2019-0708-remote-desktop-services-remote-code-execution/m-p/261017#M548</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;just wondering on expected release for signature for this Vulnerability?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;CVE-2019-0708&amp;nbsp; - Remote Desktop Services Remote Code Execution Vulnerability&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Details here:&lt;/P&gt;&lt;P&gt;&lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708" target="_blank" rel="noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Paul&lt;/P&gt;</description>
      <pubDate>Wed, 15 May 2019 02:38:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cve-2019-0708-remote-desktop-services-remote-code-execution/m-p/261017#M548</guid>
      <dc:creator>Paul_Stinson</dc:creator>
      <dc:date>2019-05-15T02:38:17Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2019-0708 Remote Desktop Services Remote Code Execution Vulnerability - Expected Signature</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cve-2019-0708-remote-desktop-services-remote-code-execution/m-p/261165#M550</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any idea, by when we have signatures for this CVE ?&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;CVE-2019-0708&lt;/SPAN&gt;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/100677"&gt;@Paul_Stinson&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;just wondering on expected release for signature for this Vulnerability?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;CVE-2019-0708&amp;nbsp; - Remote Desktop Services Remote Code Execution Vulnerability&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Details here:&lt;/P&gt;&lt;P&gt;&lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708" target="_blank" rel="noopener"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Paul&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 May 2019 15:04:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cve-2019-0708-remote-desktop-services-remote-code-execution/m-p/261165#M550</guid>
      <dc:creator>Ankit_Rai</dc:creator>
      <dc:date>2019-05-15T15:04:41Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2019-0708 Remote Desktop Services Remote Code Execution Vulnerability - Expected Signature</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cve-2019-0708-remote-desktop-services-remote-code-execution/m-p/261344#M551</link>
      <description>&lt;P&gt;hey,&lt;/P&gt;&lt;P&gt;got an response from TAC:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Regarding Microsoft CVE-2019-0708, PA has investigated a feasibility of network-based vulnerability signature coverage and so far there is no known exploitation of this CVE to possibly create a coverage signature at this time. PA will continue observe should there is any change with regards to this CVE. As per Microsoft advisory a software update fix is currently available for any impacted version of Windows.&lt;/EM&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 16 May 2019 11:48:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cve-2019-0708-remote-desktop-services-remote-code-execution/m-p/261344#M551</guid>
      <dc:creator>SinOPtik</dc:creator>
      <dc:date>2019-05-16T11:48:09Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2019-0708 Remote Desktop Services Remote Code Execution Vulnerability - Expected Signature</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cve-2019-0708-remote-desktop-services-remote-code-execution/m-p/261430#M554</link>
      <description>&lt;P&gt;Cheers thanks for the update.....interesting that there is a patch to patch the vulnerability but a signature can't be created for the vulnerability! &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 17 May 2019 03:11:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cve-2019-0708-remote-desktop-services-remote-code-execution/m-p/261430#M554</guid>
      <dc:creator>Paul_Stinson</dc:creator>
      <dc:date>2019-05-17T03:11:15Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2019-0708 Remote Desktop Services Remote Code Execution Vulnerability - Expected Signature</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cve-2019-0708-remote-desktop-services-remote-code-execution/m-p/261696#M556</link>
      <description>&lt;P&gt;Is Palo Alto at least looking into creating a signature?&amp;nbsp; TippingPoint has one and Cisco Talos is looking into creating a Snort rule.&lt;/P&gt;</description>
      <pubDate>Mon, 20 May 2019 19:49:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cve-2019-0708-remote-desktop-services-remote-code-execution/m-p/261696#M556</guid>
      <dc:creator>matthewroberson</dc:creator>
      <dc:date>2019-05-20T19:49:23Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2019-0708 Remote Desktop Services Remote Code Execution Vulnerability - Expected Signature</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cve-2019-0708-remote-desktop-services-remote-code-execution/m-p/261809#M558</link>
      <description>&lt;P&gt;Snort sigs are live for this as of last night -&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://blog.snort.org/2019/05/snort-rule-update-for-may-20-2019.html" target="_blank"&gt;https://blog.snort.org/2019/05/snort-rule-update-for-may-20-2019.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 21 May 2019 13:43:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cve-2019-0708-remote-desktop-services-remote-code-execution/m-p/261809#M558</guid>
      <dc:creator>SeanBallard</dc:creator>
      <dc:date>2019-05-21T13:43:10Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2019-0708 Remote Desktop Services Remote Code Execution Vulnerability - Expected Signature</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cve-2019-0708-remote-desktop-services-remote-code-execution/m-p/261847#M559</link>
      <description>&lt;P&gt;The signatures dont specifically detect CVE-2019-0708 they were developed to help identify "emerging threats"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have just been informed that Palo Alto's Threat team has a working PoC and are developing a signature.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 May 2019 19:26:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cve-2019-0708-remote-desktop-services-remote-code-execution/m-p/261847#M559</guid>
      <dc:creator>A.Waitkus</dc:creator>
      <dc:date>2019-05-21T19:26:49Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2019-0708 Remote Desktop Services Remote Code Execution Vulnerability - Expected Signature</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cve-2019-0708-remote-desktop-services-remote-code-execution/m-p/261848#M560</link>
      <description>&lt;P&gt;Cisco and Checkpoint both have prevent signatures live right now. PAN is in&amp;nbsp;field POC testing from what I am told and the signature should be GA here in a day or two.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 May 2019 19:29:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cve-2019-0708-remote-desktop-services-remote-code-execution/m-p/261848#M560</guid>
      <dc:creator>SeanBallard</dc:creator>
      <dc:date>2019-05-21T19:29:52Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2019-0708 Remote Desktop Services Remote Code Execution Vulnerability - Expected Signature</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cve-2019-0708-remote-desktop-services-remote-code-execution/m-p/261872#M561</link>
      <description>Released in content 8154.</description>
      <pubDate>Wed, 22 May 2019 00:11:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cve-2019-0708-remote-desktop-services-remote-code-execution/m-p/261872#M561</guid>
      <dc:creator>ssullivan</dc:creator>
      <dc:date>2019-05-22T00:11:21Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2019-0708 Remote Desktop Services Remote Code Execution Vulnerability - Expected Signature</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cve-2019-0708-remote-desktop-services-remote-code-execution/m-p/261874#M562</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;TAC only Link?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Denied!" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/20126i499D53256173280D/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="2019-05-22 09_54_11-Live Community - Access Denied - Live Community.png" alt="Denied!" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Denied!&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 21 May 2019 23:56:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cve-2019-0708-remote-desktop-services-remote-code-execution/m-p/261874#M562</guid>
      <dc:creator>Paul_Stinson</dc:creator>
      <dc:date>2019-05-21T23:56:09Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2019-0708 Remote Desktop Services Remote Code Execution Vulnerability - Expected Signature</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cve-2019-0708-remote-desktop-services-remote-code-execution/m-p/261875#M563</link>
      <description>Sorry! &lt;BR /&gt;Released in content 8154.</description>
      <pubDate>Wed, 22 May 2019 00:11:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cve-2019-0708-remote-desktop-services-remote-code-execution/m-p/261875#M563</guid>
      <dc:creator>ssullivan</dc:creator>
      <dc:date>2019-05-22T00:11:42Z</dc:date>
    </item>
  </channel>
</rss>

