<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Microsoft Windows SChannel Malformed Certificate Request Remote Code Execution in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/microsoft-windows-schannel-malformed-certificate-request-remote/m-p/36824#M27059</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anyone provide insight into the threat signature for MS10-049?&amp;nbsp;&amp;nbsp; What it triggers on, etc.?&amp;nbsp; I have seen this triggered by Goggle domain IP sources that produce certificate errors.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Monica&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 28 Aug 2013 22:10:51 GMT</pubDate>
    <dc:creator>MLaden</dc:creator>
    <dc:date>2013-08-28T22:10:51Z</dc:date>
    <item>
      <title>Microsoft Windows SChannel Malformed Certificate Request Remote Code Execution</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/microsoft-windows-schannel-malformed-certificate-request-remote/m-p/36824#M27059</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anyone provide insight into the threat signature for MS10-049?&amp;nbsp;&amp;nbsp; What it triggers on, etc.?&amp;nbsp; I have seen this triggered by Goggle domain IP sources that produce certificate errors.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Monica&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Aug 2013 22:10:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/microsoft-windows-schannel-malformed-certificate-request-remote/m-p/36824#M27059</guid>
      <dc:creator>MLaden</dc:creator>
      <dc:date>2013-08-28T22:10:51Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft Windows SChannel Malformed Certificate Request Remote Code Execution</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/microsoft-windows-schannel-malformed-certificate-request-remote/m-p/36825#M27060</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We are seeing the same thing for awhile now as well.&amp;nbsp; It looks to be something with users accessing GMAIL.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Sep 2013 19:02:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/microsoft-windows-schannel-malformed-certificate-request-remote/m-p/36825#M27060</guid>
      <dc:creator>mmorfoot</dc:creator>
      <dc:date>2013-09-26T19:02:20Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft Windows SChannel Malformed Certificate Request Remote Code Execution</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/microsoft-windows-schannel-malformed-certificate-request-remote/m-p/36826#M27061</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Monica,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt; MS10-049 :&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;There is a remote code execution vulnerability in Microsoft Windows SChannel when it validates a certificate request message sent by the server on a client. An attacker could host a specially crafted Web site that is designed to exploit these vulnerabilities through an Internet Web browser and then convince a user to view the Web site.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;More information on it can be found at:&lt;/P&gt;&lt;P&gt;&lt;A href="http://technet.microsoft.com/en-us/security/bulletin/MS10-049" title="http://technet.microsoft.com/en-us/security/bulletin/MS10-049"&gt;Microsoft Security Bulletin MS10-049 - Critical : Vulnerabilities in SChannel could allow Remote Code Execution (980436)&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, its known by CVE - 2010-2566. More information on that can be found at : &lt;A href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2566" title="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2566"&gt;CVE -CVE-2010-2566&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our threat database does cover the signature by threat ID: 33372&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that is the information you were looking for.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Kunal Adak&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Sep 2013 21:32:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/microsoft-windows-schannel-malformed-certificate-request-remote/m-p/36826#M27061</guid>
      <dc:creator>kadak</dc:creator>
      <dc:date>2013-09-26T21:32:37Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft Windows SChannel Malformed Certificate Request Remote Code Execution</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/microsoft-windows-schannel-malformed-certificate-request-remote/m-p/36827#M27062</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any recommendation by Palo Alto?&lt;/P&gt;&lt;P&gt;I mean if is there any way to tackle this in our palo alto firewall?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,:smileyinfo:&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Oct 2014 17:29:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/microsoft-windows-schannel-malformed-certificate-request-remote/m-p/36827#M27062</guid>
      <dc:creator>SOC_CSG</dc:creator>
      <dc:date>2014-10-29T17:29:07Z</dc:date>
    </item>
  </channel>
</rss>

