<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Vulnerability false positive uptick? 32128 in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-false-positive-uptick-32128/m-p/23638#M17235</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have identified an issue with this signature and will be correcting the issue in the next content update on Feb 5th.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 28 Jan 2013 19:14:08 GMT</pubDate>
    <dc:creator>tettema</dc:creator>
    <dc:date>2013-01-28T19:14:08Z</dc:date>
    <item>
      <title>Vulnerability false positive uptick? 32128</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-false-positive-uptick-32128/m-p/23632#M17229</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;All of a sudden we've started tripping 32128 Pidgin MSN Integer Overflow Vulnerability. It started yesterday morning. Most of the traffic is coming from live.com to large assortment of our internal users.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm guessing that this is a change on Microsoft's part. Any ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Message was edited by: Rand Hall&#xD;
&#xD;
I added a couple of packet captures.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Jan 2013 18:08:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-false-positive-uptick-32128/m-p/23632#M17229</guid>
      <dc:creator>MCmgt</dc:creator>
      <dc:date>2013-01-24T18:08:48Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability false positive uptick? 32128</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-false-positive-uptick-32128/m-p/23633#M17230</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We've started seeing FPs from this exact same threat too&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Jan 2013 18:40:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-false-positive-uptick-32128/m-p/23633#M17230</guid>
      <dc:creator>ericgearhart</dc:creator>
      <dc:date>2013-01-24T18:40:32Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability false positive uptick? 32128</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-false-positive-uptick-32128/m-p/23634#M17231</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can check our Threat Vault for more information on the Threat ID from the Support Portal.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's the description for the threat in our database:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #252525; font-family: Arial, Helvetica, sans-serif; font-size: 12px; text-align: -webkit-auto; background-color: #ffffff;"&gt;Pidgin is prone to a integer overflow vulnerability while parsing certain crafted MSN protocol messages.The vulnerability is due to the lack of proper checks on message header in the MSN protocol , leading to an exploitable overflow. An attacker could exploit the vulnerability by sending a crafted MSN response. A successful attack could lead to remote code execution with the privileges of the current logged-in user.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #252525; font-family: Arial, Helvetica, sans-serif; font-size: 12px; text-align: -webkit-auto; background-color: #ffffff;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Other References:&lt;/P&gt;&lt;TABLE style="border: 1px solid #aaaaaa; color: #252525; font-family: Arial, Helvetica, sans-serif; font-size: 12px; text-align: -webkit-auto; background-color: #ffffff;"&gt;&lt;TBODY&gt;&lt;TR class="spaceunder"&gt;&lt;TD style="padding-top: 5px; padding-bottom: 5px; border-left-width: 1px; border-left-style: solid; border-left-color: #aaaaaa; border-right-width: 1px; border-right-style: solid; border-right-color: #aaaaaa;"&gt;&lt;A href="http://secunia.com/advisories/30971/" style="color: #1d60ff; text-decoration: underline;" target="_blank"&gt;http://secunia.com/advisories/30971/&lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR class="spaceunder" style="background-color: #d6e1e7;"&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As per the advisory, this should affect only Pidgin versions earlier to 2.4.3. Please verify and open a case with Support if this is a false positive.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Jan 2013 05:58:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-false-positive-uptick-32128/m-p/23634#M17231</guid>
      <dc:creator>apasupulati</dc:creator>
      <dc:date>2013-01-25T05:58:10Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability false positive uptick? 32128</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-false-positive-uptick-32128/m-p/23635#M17232</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ditto.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Has Palo Alto been seeing any reports as to this as well?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Jan 2013 15:40:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-false-positive-uptick-32128/m-p/23635#M17232</guid>
      <dc:creator>dciccone</dc:creator>
      <dc:date>2013-01-28T15:40:37Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability false positive uptick? 32128</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-false-positive-uptick-32128/m-p/23636#M17233</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello, Where are we with this? Has this been identified as a false positive in the next threat update? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Jan 2013 17:33:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-false-positive-uptick-32128/m-p/23636#M17233</guid>
      <dc:creator>yurilychacz</dc:creator>
      <dc:date>2013-01-28T17:33:58Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability false positive uptick? 32128</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-false-positive-uptick-32128/m-p/23637#M17234</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I submitted a false positive report but have not received any feedback thus far.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Jan 2013 17:38:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-false-positive-uptick-32128/m-p/23637#M17234</guid>
      <dc:creator>MCmgt</dc:creator>
      <dc:date>2013-01-28T17:38:01Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability false positive uptick? 32128</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-false-positive-uptick-32128/m-p/23638#M17235</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have identified an issue with this signature and will be correcting the issue in the next content update on Feb 5th.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Jan 2013 19:14:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-false-positive-uptick-32128/m-p/23638#M17235</guid>
      <dc:creator>tettema</dc:creator>
      <dc:date>2013-01-28T19:14:08Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability false positive uptick? 32128</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-false-positive-uptick-32128/m-p/23639#M17236</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;While awaiting the signature update, could you suggest the recommended way to deal with all of these alerts?&amp;nbsp; Should I add an exception and change to allow, not alert?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Jan 2013 20:57:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-false-positive-uptick-32128/m-p/23639#M17236</guid>
      <dc:creator>pwoll</dc:creator>
      <dc:date>2013-01-28T20:57:39Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability false positive uptick? 32128</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-false-positive-uptick-32128/m-p/23640#M17237</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi pwoll. I recently had a conversation with a PA Tech and what we did was simply add an exception as you stated. Although you would want to verify that this specific application is not being used on your network before doing so (in my case IM is blocked via another method).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Jan 2013 21:01:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-false-positive-uptick-32128/m-p/23640#M17237</guid>
      <dc:creator>dciccone</dc:creator>
      <dc:date>2013-01-28T21:01:23Z</dc:date>
    </item>
  </channel>
</rss>

