<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: About Microsoft Vulnerability in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/about-microsoft-vulnerability/m-p/33772#M24782</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also bear in mind that with server to client vulnerability signature this could be triggered by an attempt by the outside client to use the exploit to compromise the server.&amp;nbsp; Thus you would not find anything on the server itself but should try to identify the client side of the transaction.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 07 Mar 2015 12:35:28 GMT</pubDate>
    <dc:creator>pulukas</dc:creator>
    <dc:date>2015-03-07T12:35:28Z</dc:date>
    <item>
      <title>About Microsoft Vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/about-microsoft-vulnerability/m-p/33770#M24780</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My customers PA-3020 detected&amp;nbsp; a few&amp;nbsp; Microsoft Vulnerability Threat coming from Inside ( Web server ) to Outside&amp;nbsp; ( Internet ) . &lt;/P&gt;&lt;P&gt;We investigated the cause of this , but could not replicate the issue and finding the cause of it. &lt;/P&gt;&lt;P&gt;We scanned web server for malware , corrupt jpeg files but it was clean. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Detected Vulnerabilities are :&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="EN-US" style="font-size: 12.0pt; font-family: 'ＭＳ Ｐゴシック';"&gt;&lt;SPAN lang="EN-US" style="font-size: 12.0pt; font-family: 'ＭＳ Ｐゴシック';"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="EN-US" style="font-size: 12.0pt; font-family: 'ＭＳ Ｐゴシック';"&gt;&lt;SPAN lang="EN-US" style="font-size: 12.0pt; font-family: 'ＭＳ Ｐゴシック';"&gt;Microsoft Windows Paint JPEG Integer Overflow Vulnerability(32831)&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="EN-US" style="font-size: 12.0pt; font-family: 'ＭＳ Ｐゴシック';"&gt;&lt;SPAN lang="EN-US" style="font-size: 12.0pt; font-family: 'ＭＳ Ｐゴシック';"&gt;Microsoft DirectShow JPEG Parsing Memory Corruption Vulnerability(36396)&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="EN-US" style="font-size: 12.0pt; font-family: 'ＭＳ Ｐゴシック';"&gt;&lt;SPAN lang="EN-US" style="font-size: 12.0pt; font-family: 'ＭＳ Ｐゴシック';"&gt;Microsoft Windows Paint JPEG Integer Overflow Vulnerability(32831)&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; PA-3020 log details: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="EN-US" style="font-size: 12.0pt; font-family: 'ＭＳ Ｐゴシック';"&gt;actionflags: 0x0&lt;BR /&gt; type: THREAT&lt;BR /&gt; subtype: vulnerability&lt;BR /&gt; config_ver: 1&lt;BR /&gt; time_generated: 2015/02/27 08:10:38&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="EN-US" style="font-size: 12.0pt; font-family: 'ＭＳ Ｐゴシック';"&gt;&lt;SPAN lang="EN-US" style="font-size: 12.0pt; font-family: 'ＭＳ Ｐゴシック';"&gt;flags: 0x400000&lt;BR /&gt; proto: tcp&lt;BR /&gt; action: alert&lt;BR /&gt; cpadding: 0&lt;BR /&gt; threatid: Microsoft Windows Paint JPEG Integer Overflow Vulnerability(32831)&lt;BR /&gt; category: any&lt;BR /&gt; contenttype: &lt;BR /&gt; behavior: 0x0500000000000000000000000000000000000000000000000000000000000000&lt;BR /&gt; severity: critical&lt;BR /&gt; direction: server-to-client&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="EN-US" style="font-size: 12.0pt; font-family: 'ＭＳ Ｐゴシック';"&gt;&lt;SPAN lang="EN-US" style="font-size: 12.0pt; font-family: 'ＭＳ Ｐゴシック';"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="EN-US" style="font-size: 12.0pt; font-family: 'ＭＳ Ｐゴシック';"&gt;&lt;SPAN lang="EN-US" style="font-size: 12.0pt; font-family: 'ＭＳ Ｐゴシック';"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="EN-US" style="font-size: 12.0pt; font-family: 'ＭＳ Ｐゴシック';"&gt;&lt;SPAN lang="EN-US" style="font-size: 12.0pt; font-family: 'ＭＳ Ｐゴシック';"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="EN-US" style="font-size: 12.0pt; font-family: 'ＭＳ Ｐゴシック';"&gt;&lt;SPAN lang="EN-US" style="font-size: 12.0pt; font-family: 'ＭＳ Ｐゴシック';"&gt;&lt;SPAN lang="EN-US" style="font-size: 12.0pt; font-family: 'ＭＳ Ｐゴシック';"&gt;actionflags: 0x0&lt;BR /&gt; type: THREAT&lt;BR /&gt; subtype: vulnerability&lt;BR /&gt; config_ver: 1&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="EN-US" style="font-size: 12.0pt; font-family: 'ＭＳ Ｐゴシック';"&gt;&lt;SPAN lang="EN-US" style="font-size: 12.0pt; font-family: 'ＭＳ Ｐゴシック';"&gt;&lt;SPAN lang="EN-US" style="font-size: 12.0pt; font-family: 'ＭＳ Ｐゴシック';"&gt;proto: tcp&lt;BR /&gt; action: alert&lt;BR /&gt; cpadding: 0&lt;BR /&gt; threatid: Microsoft DirectShow JPEG Parsing Memory Corruption Vulnerability(36396)&lt;BR /&gt; category: any&lt;BR /&gt; contenttype: &lt;BR /&gt; behavior: 0x0500000000000000000000000000000000000000000000000000000000000000&lt;BR /&gt; severity: critica l&lt;BR /&gt; direction: server-to-client&lt;BR /&gt; misc: &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="EN-US" style="font-size: 12.0pt; font-family: 'ＭＳ Ｐゴシック';"&gt;&lt;SPAN lang="EN-US" style="font-size: 12.0pt; font-family: 'ＭＳ Ｐゴシック';"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="EN-US" style="font-size: 12.0pt; font-family: 'ＭＳ Ｐゴシック';"&gt;&lt;SPAN lang="EN-US" style="font-size: 12.0pt; font-family: 'ＭＳ Ｐゴシック';"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="EN-US" style="font-size: 12.0pt; font-family: 'ＭＳ Ｐゴシック';"&gt;&lt;SPAN lang="EN-US" style="font-size: 12.0pt; font-family: 'ＭＳ Ｐゴシック';"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could this be a false positive from PA-3020 ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Has someone seen a similar alert&amp;nbsp; on their Palo Alto firewall ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Adrian&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="EN-US" style="font-size: 12.0pt; font-family: 'ＭＳ Ｐゴシック';"&gt;&lt;SPAN lang="EN-US" style="font-size: 12.0pt; font-family: 'ＭＳ Ｐゴシック';"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="EN-US" style="font-size: 12.0pt; font-family: 'ＭＳ Ｐゴシック';"&gt;&lt;SPAN lang="EN-US" style="font-size: 12.0pt; font-family: 'ＭＳ Ｐゴシック';"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Mar 2015 08:06:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/about-microsoft-vulnerability/m-p/33770#M24780</guid>
      <dc:creator>AdiAINS1982</dc:creator>
      <dc:date>2015-03-06T08:06:59Z</dc:date>
    </item>
    <item>
      <title>Re: About Microsoft Vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/about-microsoft-vulnerability/m-p/33771#M24781</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Adrian,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It looks, the server response is matchingwith PAN firewall's signature database. The direction of the Vulnerability is showing "server-to-Client".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You may check the details of those individual threatID from: &lt;A href="https://threatvault.paloaltonetworks.com/" title="https://threatvault.paloaltonetworks.com/"&gt;https://threatvault.paloaltonetworks.com/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A reference document for threat log direction &lt;A href="https://live.paloaltonetworks.com/docs/DOC-1140"&gt;Threat Logs Show Inverted/Reversed Direction for Source and Destination IP Addresses&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Mar 2015 09:15:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/about-microsoft-vulnerability/m-p/33771#M24781</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2015-03-06T09:15:47Z</dc:date>
    </item>
    <item>
      <title>Re: About Microsoft Vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/about-microsoft-vulnerability/m-p/33772#M24782</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also bear in mind that with server to client vulnerability signature this could be triggered by an attempt by the outside client to use the exploit to compromise the server.&amp;nbsp; Thus you would not find anything on the server itself but should try to identify the client side of the transaction.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 07 Mar 2015 12:35:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/about-microsoft-vulnerability/m-p/33772#M24782</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2015-03-07T12:35:28Z</dc:date>
    </item>
  </channel>
</rss>

