<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Heratbleed CVE-2014-0160 - New Vulnerability Signatures in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/heratbleed-cve-2014-0160-new-vulnerability-signatures/m-p/22323#M16279</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;And the choices that you have on the PA are to alert or block. How many users are blocking?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 11 Apr 2014 15:51:23 GMT</pubDate>
    <dc:creator>infotech</dc:creator>
    <dc:date>2014-04-11T15:51:23Z</dc:date>
    <item>
      <title>Heratbleed CVE-2014-0160 - New Vulnerability Signatures</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/heratbleed-cve-2014-0160-new-vulnerability-signatures/m-p/22318#M16274</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Palo Alto released multiple vulnerabilities for the Heartbleed bug.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H3&gt;New Vulnerability Signatures (3)&lt;/H3&gt;&lt;TABLE border="0" cellpadding="0" style="width: 90%;"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD style="background: #999999; padding: 1.5pt 1.5pt 1.5pt 1.5pt;" width="71"&gt;&lt;P align="center" style="text-align: center;"&gt;&lt;STRONG style="color: white; font-size: 9.0pt; font-family: 'Tahoma','sans-serif';"&gt;Severity&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background: #999999; padding: 1.5pt 1.5pt 1.5pt 1.5pt;" width="71"&gt;&lt;P align="center" style="text-align: center;"&gt;&lt;STRONG style="color: white; font-size: 9.0pt; font-family: 'Tahoma','sans-serif';"&gt;ID&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background: #999999; padding: 1.5pt 1.5pt 1.5pt 1.5pt;"&gt;&lt;P align="center" style="text-align: center;"&gt;&lt;STRONG style="color: white; font-size: 9.0pt; font-family: 'Tahoma','sans-serif';"&gt;Attack Name&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background: #999999; padding: 1.5pt 1.5pt 1.5pt 1.5pt;" width="105"&gt;&lt;P align="center" style="text-align: center;"&gt;&lt;STRONG style="color: white; font-size: 9.0pt; font-family: 'Tahoma','sans-serif';"&gt;CVE ID&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background: #999999; padding: 1.5pt 1.5pt 1.5pt 1.5pt;" width="80"&gt;&lt;P align="center" style="text-align: center;"&gt;&lt;STRONG style="color: white; font-size: 9.0pt; font-family: 'Tahoma','sans-serif';"&gt;Vendor ID&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background: #999999; padding: 1.5pt 1.5pt 1.5pt 1.5pt;" width="18%"&gt;&lt;P align="center" style="text-align: center;"&gt;&lt;STRONG style="color: white; font-size: 9.0pt; font-family: 'Tahoma','sans-serif';"&gt;Default Action&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background: #999999; padding: 1.5pt 1.5pt 1.5pt 1.5pt;" width="18%"&gt;&lt;P align="center" style="text-align: center;"&gt;&lt;STRONG style="color: white; font-size: 9.0pt; font-family: 'Tahoma','sans-serif';"&gt;Minimum PAN-OS Version&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="background: #F7D600; padding: .75pt 3.75pt .75pt 3.75pt;"&gt;&lt;P align="center" style="text-align: center;"&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Tahoma','sans-serif'; color: #111111;"&gt;medium&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background: #EEEEEE; padding: .75pt 3.75pt .75pt 3.75pt;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Tahoma','sans-serif'; color: #111111;"&gt;40039&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background: #EEEEEE; padding: .75pt 3.75pt .75pt 3.75pt;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Tahoma','sans-serif'; color: #111111;"&gt;OpenSSL TLS Heartbeat Brute Force - Heartbleed&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background: #EEEEEE; padding: .75pt 3.75pt .75pt 3.75pt;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Tahoma','sans-serif'; color: #111111;"&gt;CVE-2014-0160&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background: #EEEEEE; padding: .75pt 3.75pt .75pt 3.75pt;"&gt;&lt;/TD&gt;&lt;TD style="background: #EEEEEE; padding: .75pt 3.75pt .75pt 3.75pt;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Tahoma','sans-serif'; color: #111111;"&gt;alert&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background: #EEEEEE; padding: .75pt 3.75pt .75pt 3.75pt;"&gt;&lt;OL style="list-style-type: decimal;"&gt;&lt;LI&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Tahoma','sans-serif'; color: #111111;"&gt;3.1.0&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="background: white; padding: .75pt 3.75pt .75pt 3.75pt;"&gt;&lt;P align="center" style="text-align: center;"&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Tahoma','sans-serif'; color: #111111;"&gt;informational&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background: #EEEEEE; padding: .75pt 3.75pt .75pt 3.75pt;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Tahoma','sans-serif'; color: #111111;"&gt;36417&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background: #EEEEEE; padding: .75pt 3.75pt .75pt 3.75pt;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Tahoma','sans-serif'; color: #111111;"&gt;OpenSSL TLS Heartbeat Found&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background: #EEEEEE; padding: .75pt 3.75pt .75pt 3.75pt;"&gt;&lt;/TD&gt;&lt;TD style="background: #EEEEEE; padding: .75pt 3.75pt .75pt 3.75pt;"&gt;&lt;/TD&gt;&lt;TD style="background: #EEEEEE; padding: .75pt 3.75pt .75pt 3.75pt;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Tahoma','sans-serif'; color: #111111;"&gt;alert&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background: #EEEEEE; padding: .75pt 3.75pt .75pt 3.75pt;"&gt;&lt;OL style="list-style-type: decimal;"&gt;&lt;LI&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Tahoma','sans-serif'; color: #111111;"&gt;3.1.0&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="background: #F7D600; padding: .75pt 3.75pt .75pt 3.75pt;"&gt;&lt;P align="center" style="text-align: center;"&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Tahoma','sans-serif'; color: #111111;"&gt;medium&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background: #EEEEEE; padding: .75pt 3.75pt .75pt 3.75pt;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Tahoma','sans-serif'; color: #111111;"&gt;36418&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background: #EEEEEE; padding: .75pt 3.75pt .75pt 3.75pt;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Tahoma','sans-serif'; color: #111111;"&gt;OpenSSL TLS Malformed Heartbeat Response Found - Heartbleed&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background: #EEEEEE; padding: .75pt 3.75pt .75pt 3.75pt;"&gt;&lt;/TD&gt;&lt;TD style="background: #EEEEEE; padding: .75pt 3.75pt .75pt 3.75pt;"&gt;&lt;/TD&gt;&lt;TD style="background: #EEEEEE; padding: .75pt 3.75pt .75pt 3.75pt;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Tahoma','sans-serif'; color: #111111;"&gt;alert&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background: #EEEEEE; padding: .75pt 3.75pt .75pt 3.75pt;"&gt;&lt;OL style="list-style-type: decimal;"&gt;&lt;LI&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Tahoma','sans-serif'; color: #111111;"&gt;3.1.0&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;H3&gt;Modified Vulnerability Signatures (1)&lt;/H3&gt;&lt;TABLE border="0" cellpadding="0" width="90%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD style="background: #999999; padding: 1.5pt 1.5pt 1.5pt 1.5pt;" width="71"&gt;&lt;P align="center" style="text-align: center;"&gt;&lt;STRONG style="color: white; font-size: 9.0pt; font-family: 'Tahoma','sans-serif';"&gt;Severity&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background: #999999; padding: 1.5pt 1.5pt 1.5pt 1.5pt;" width="71"&gt;&lt;P align="center" style="text-align: center;"&gt;&lt;STRONG style="color: white; font-size: 9.0pt; font-family: 'Tahoma','sans-serif';"&gt;ID&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background: #999999; padding: 1.5pt 1.5pt 1.5pt 1.5pt;"&gt;&lt;P align="center" style="text-align: center;"&gt;&lt;STRONG style="color: white; font-size: 9.0pt; font-family: 'Tahoma','sans-serif';"&gt;Attack Name&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background: #999999; padding: 1.5pt 1.5pt 1.5pt 1.5pt;" width="105"&gt;&lt;P align="center" style="text-align: center;"&gt;&lt;STRONG style="color: white; font-size: 9.0pt; font-family: 'Tahoma','sans-serif';"&gt;CVE ID&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background: #999999; padding: 1.5pt 1.5pt 1.5pt 1.5pt;" width="80"&gt;&lt;P align="center" style="text-align: center;"&gt;&lt;STRONG style="color: white; font-size: 9.0pt; font-family: 'Tahoma','sans-serif';"&gt;Vendor ID&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background: #999999; padding: 1.5pt 1.5pt 1.5pt 1.5pt;" width="18%"&gt;&lt;P align="center" style="text-align: center;"&gt;&lt;STRONG style="color: white; font-size: 9.0pt; font-family: 'Tahoma','sans-serif';"&gt;Default Action&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background: #999999; padding: 1.5pt 1.5pt 1.5pt 1.5pt;" width="18%"&gt;&lt;P align="center" style="text-align: center;"&gt;&lt;STRONG style="color: white; font-size: 9.0pt; font-family: 'Tahoma','sans-serif';"&gt;Minimum PAN-OS Version&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="background: #EF3942; padding: .75pt 3.75pt .75pt 3.75pt;"&gt;&lt;P align="center" style="text-align: center;"&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Tahoma','sans-serif'; color: #111111;"&gt;critical&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background: #EEEEEE; padding: .75pt 3.75pt .75pt 3.75pt;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Tahoma','sans-serif'; color: #111111;"&gt;36416&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background: #EEEEEE; padding: .75pt 3.75pt .75pt 3.75pt;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Tahoma','sans-serif'; color: #111111;"&gt;OpenSSL TLS Heartbeat Information Disclosure Vulnerability - Heartbleed&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background: #EEEEEE; padding: .75pt 3.75pt .75pt 3.75pt;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Tahoma','sans-serif'; color: #111111;"&gt;CVE-2014-0160&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background: #EEEEEE; padding: .75pt 3.75pt .75pt 3.75pt;"&gt;&lt;/TD&gt;&lt;TD style="background: #EEEEEE; padding: .75pt 3.75pt .75pt 3.75pt;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Tahoma','sans-serif'; color: #111111;"&gt;reset-server&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background: #EEEEEE; padding: .75pt 3.75pt .75pt 3.75pt;"&gt;&lt;OL style="list-style-type: decimal;"&gt;&lt;LI&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Tahoma','sans-serif'; color: #111111;"&gt;3.1.0&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are we fully protected when using the default settings?&lt;/P&gt;&lt;P&gt;Could there be any negative impact when setting "&lt;SPAN style="font-size: 9.0pt; font-family: 'Tahoma','sans-serif'; color: #111111;"&gt;OpenSSL TLS Malformed Heartbeat Response Found - Heartbleed" also to drop? Or any of the other?&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Tahoma','sans-serif'; color: #111111;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Tahoma','sans-serif'; color: #111111;"&gt;Kind regards&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Apr 2014 11:02:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/heratbleed-cve-2014-0160-new-vulnerability-signatures/m-p/22318#M16274</guid>
      <dc:creator>${userLoginName}</dc:creator>
      <dc:date>2014-04-11T11:02:43Z</dc:date>
    </item>
    <item>
      <title>Re: Heratbleed CVE-2014-0160 - New Vulnerability Signatures</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/heratbleed-cve-2014-0160-new-vulnerability-signatures/m-p/22319#M16275</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This new package it too new for having feeback? But you can test it with "alert" as action with no risk &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope help&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;V.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Apr 2014 12:01:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/heratbleed-cve-2014-0160-new-vulnerability-signatures/m-p/22319#M16275</guid>
      <dc:creator>VinceM</dc:creator>
      <dc:date>2014-04-11T12:01:56Z</dc:date>
    </item>
    <item>
      <title>Re: Heratbleed CVE-2014-0160 - New Vulnerability Signatures</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/heratbleed-cve-2014-0160-new-vulnerability-signatures/m-p/22320#M16276</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So there is another updated issue for heartbleed?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Apr 2014 13:02:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/heratbleed-cve-2014-0160-new-vulnerability-signatures/m-p/22320#M16276</guid>
      <dc:creator>infotech</dc:creator>
      <dc:date>2014-04-11T13:02:21Z</dc:date>
    </item>
    <item>
      <title>Re: Heratbleed CVE-2014-0160 - New Vulnerability Signatures</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/heratbleed-cve-2014-0160-new-vulnerability-signatures/m-p/22321#M16277</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;FYI just for the benefit of the community, I have run ssltest.py against an internal server that is known to be susceptible to heartbleed and ssltest.py reports it as NOT VULNERABLE. We have tested nmap's ssl-heartbleed NSE script against the same server and Nmap's NSE script correctly identifies it as vulnerable.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Long story short, be careful what scripts you're running to verify if servers seem to be vulnerable or not&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Apr 2014 15:41:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/heratbleed-cve-2014-0160-new-vulnerability-signatures/m-p/22321#M16277</guid>
      <dc:creator>ericgearhart</dc:creator>
      <dc:date>2014-04-11T15:41:40Z</dc:date>
    </item>
    <item>
      <title>Re: Heratbleed CVE-2014-0160 - New Vulnerability Signatures</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/heratbleed-cve-2014-0160-new-vulnerability-signatures/m-p/22322#M16278</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also I just looked and it appears that the NMAP NSE script causes our PA4020 to correctly flag "OpenSSL TLS Heartbeat found" when I scan the vulnerable server! So the PA threat update is working&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Apr 2014 15:43:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/heratbleed-cve-2014-0160-new-vulnerability-signatures/m-p/22322#M16278</guid>
      <dc:creator>ericgearhart</dc:creator>
      <dc:date>2014-04-11T15:43:47Z</dc:date>
    </item>
    <item>
      <title>Re: Heratbleed CVE-2014-0160 - New Vulnerability Signatures</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/heratbleed-cve-2014-0160-new-vulnerability-signatures/m-p/22323#M16279</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;And the choices that you have on the PA are to alert or block. How many users are blocking?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Apr 2014 15:51:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/heratbleed-cve-2014-0160-new-vulnerability-signatures/m-p/22323#M16279</guid>
      <dc:creator>infotech</dc:creator>
      <dc:date>2014-04-11T15:51:23Z</dc:date>
    </item>
  </channel>
</rss>

