<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Vulnerability in Schannel Could Allow Remote Code Execution MS14-066 - Critical in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-in-schannel-could-allow-remote-code-execution-ms14/m-p/44307#M32521</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Awesome!&amp;nbsp; Thank you for the quick response!&amp;nbsp; You saved me a call to support.&amp;nbsp; &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 15 Nov 2014 06:36:52 GMT</pubDate>
    <dc:creator>RyanF</dc:creator>
    <dc:date>2014-11-15T06:36:52Z</dc:date>
    <item>
      <title>Vulnerability in Schannel Could Allow Remote Code Execution MS14-066 - Critical</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-in-schannel-could-allow-remote-code-execution-ms14/m-p/44300#M32514</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Some bad news ... this time addressed to Windows Systems&lt;/P&gt;&lt;P&gt;&lt;A href="https://technet.microsoft.com/library/security/MS14-066" title="https://technet.microsoft.com/library/security/MS14-066"&gt;https://technet.microsoft.com/library/security/MS14-066&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and some news &lt;A href="http://pastebin.com/bsgX01dU" title="http://pastebin.com/bsgX01dU"&gt;SChannelShenanigans - Pastebin.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At the moment this volnureablity isnt covered by thread prevention. We must wait some time. Probably until tommorow because this is critical volnureability and PA last time very quicly responded to such problems.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Slawek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Nov 2014 20:16:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-in-schannel-could-allow-remote-code-execution-ms14/m-p/44300#M32514</guid>
      <dc:creator>_slv_</dc:creator>
      <dc:date>2014-11-12T20:16:03Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability in Schannel Could Allow Remote Code Execution MS14-066 - Critical</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-in-schannel-could-allow-remote-code-execution-ms14/m-p/44301#M32515</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;and finally we got it!&lt;/P&gt;&lt;P&gt;&lt;A href="https://downloads.paloaltonetworks.com/content/content-469-2452.html?__gda__=1415993757_35819be82884cbd93ca96c92b3fd92e2" title="https://downloads.paloaltonetworks.com/content/content-469-2452.html?__gda__=1415993757_35819be82884cbd93ca96c92b3fd92e2"&gt;Version 469 Content Release Notes&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Slawek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Nov 2014 07:37:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-in-schannel-could-allow-remote-code-execution-ms14/m-p/44301#M32515</guid>
      <dc:creator>_slv_</dc:creator>
      <dc:date>2014-11-14T07:37:02Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability in Schannel Could Allow Remote Code Execution MS14-066 - Critical</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-in-schannel-could-allow-remote-code-execution-ms14/m-p/44302#M32516</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;MS14-066 is *not* addressed in PAN Threat Release Version 469.&amp;nbsp; Although it is an emergency release, new filters are added for MS14-064 + MS14-065.&amp;nbsp; &lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;MS14-066 is still nowhere to be found.&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;Any idea when is this expected?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FYI - for folks that are also TippingPoint customers, t&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;his is covered in Digital Vaccine #DV8633, released on November 11, 2014.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;-Matt&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;*********************************************************&lt;/P&gt;&lt;P&gt;This DV includes coverage for the Microsoft Security&lt;/P&gt;&lt;P&gt;Bulletins released on November 11, 2014. The&lt;/P&gt;&lt;P&gt;following table maps TippingPoint filters to the&lt;/P&gt;&lt;P&gt;Microsoft Bulletins.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bulletin #&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; TippingPoint Filter #&lt;/P&gt;&lt;P&gt;*********************************************************&lt;/P&gt;&lt;P&gt;MS14-065&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 16492*,16552*,16556*,16559*,16561*,16857*,16944*,16954,16955,16956*,16957,16960,16968&lt;/P&gt;&lt;P&gt;MS14-064&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 16926,16946&lt;/P&gt;&lt;P&gt;MS14-066&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 16961&lt;/P&gt;&lt;P&gt;MS14-069&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 16945,16950,16953&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;16961: DTLS: Microsoft SChannel Cookie Length Buffer Overflow Vulnerability&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Category: Vulnerabilities&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; CVE: 2014-6321, &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Description:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; This filter detects an attempt to exploit a buffer overflow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; vulnerability in Microsoft Secure Channel (SChannel) security&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; package.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Use of RECOMMEND action as category setting will cause this filter to be:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Disabled in default deployments.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Enabled with the "block+notify" action set in aggressive deployments.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Enabled with the "block+notify" action set in hyper-aggressive deployments.&lt;/P&gt;&lt;P&gt;16961: DTLS: Microsoft SChannel Cookie Length Buffer Overflow Vulnerability&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Category: Vulnerabilities&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; CVE: 2014-6321, &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Description:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; This filter detects an attempt to exploit a buffer overflow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; vulnerability in Microsoft Secure Channel (SChannel) security&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; package.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Use of RECOMMEND action as category setting will cause this filter to be:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Disabled in default deployments.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Enabled with the "block+notify" action set in aggressive deployments.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Enabled with the "block+notify" action set in hyper-aggressive deployments.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Nov 2014 16:24:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-in-schannel-could-allow-remote-code-execution-ms14/m-p/44302#M32516</guid>
      <dc:creator>dill</dc:creator>
      <dc:date>2014-11-14T16:24:48Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability in Schannel Could Allow Remote Code Execution MS14-066 - Critical</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-in-schannel-could-allow-remote-code-execution-ms14/m-p/44303#M32517</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Good news! Finally PANOS has got coverage for MS14-066 on content release 470. Just downloaded and confirmed the release containing the 5 threat ids. Please take a look at the release notes below and update your PANOS firewall to get the coverage.&lt;/P&gt;&lt;P&gt;&lt;A href="https://downloads.paloaltonetworks.com/content/content-470-2459.html?__gda__=1416630577_e3de0996cc297be06ead50fc93cb392d" title="https://downloads.paloaltonetworks.com/content/content-470-2459.html?__gda__=1416630577_e3de0996cc297be06ead50fc93cb392d"&gt;Version 470 Content Release Notes&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 15 Nov 2014 04:49:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-in-schannel-could-allow-remote-code-execution-ms14/m-p/44303#M32517</guid>
      <dc:creator>babebe</dc:creator>
      <dc:date>2014-11-15T04:49:26Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability in Schannel Could Allow Remote Code Execution MS14-066 - Critical</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-in-schannel-could-allow-remote-code-execution-ms14/m-p/44304#M32518</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;FYI..&lt;/P&gt;&lt;P&gt;&lt;IMG alt="app-id-470.JPG" class="image-0 jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/16896_app-id-470.JPG" style="height: 280px; width: 620px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 15 Nov 2014 06:02:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-in-schannel-could-allow-remote-code-execution-ms14/m-p/44304#M32518</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-11-15T06:02:32Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability in Schannel Could Allow Remote Code Execution MS14-066 - Critical</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-in-schannel-could-allow-remote-code-execution-ms14/m-p/44305#M32519</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To protect web servers with this threat signature, do we need to have SSL inbound inspection enabled?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 15 Nov 2014 06:11:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-in-schannel-could-allow-remote-code-execution-ms14/m-p/44305#M32519</guid>
      <dc:creator>RyanF</dc:creator>
      <dc:date>2014-11-15T06:11:58Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability in Schannel Could Allow Remote Code Execution MS14-066 - Critical</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-in-schannel-could-allow-remote-code-execution-ms14/m-p/44306#M32520</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi RyanF,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In SSL inbound decryption, &lt;SPAN style="font-size: 10pt;"&gt;&lt;SPAN style="line-height: 1.5em;"&gt;PAN device uses server’s certificate and private key to decrypt the traffic between client and server. PAN &lt;/SPAN&gt;&lt;SPAN style="line-height: 19.5px;"&gt;doesn't&lt;/SPAN&gt;&lt;SPAN style="line-height: 1.5em;"&gt; terminate the TCP connections and &lt;/SPAN&gt;&lt;/SPAN&gt;doesn't&lt;SPAN style="line-height: 1.5em; font-size: 10pt;"&gt; modify packets’ data. Therefore the attack packets will reach the servers intact even if you have SSL inbound decryption. The signature should work with/without the decryption in place by mitigating the attack traffic at it hits the PAN before it reaches the destination servers. I hope that answers your question.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Bezabih&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 15 Nov 2014 06:34:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-in-schannel-could-allow-remote-code-execution-ms14/m-p/44306#M32520</guid>
      <dc:creator>babebe</dc:creator>
      <dc:date>2014-11-15T06:34:11Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability in Schannel Could Allow Remote Code Execution MS14-066 - Critical</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-in-schannel-could-allow-remote-code-execution-ms14/m-p/44307#M32521</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Awesome!&amp;nbsp; Thank you for the quick response!&amp;nbsp; You saved me a call to support.&amp;nbsp; &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 15 Nov 2014 06:36:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-in-schannel-could-allow-remote-code-execution-ms14/m-p/44307#M32521</guid>
      <dc:creator>RyanF</dc:creator>
      <dc:date>2014-11-15T06:36:52Z</dc:date>
    </item>
  </channel>
</rss>

