<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Vulnerability Vs Successful Expolit in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-vs-successful-expolit/m-p/46977#M34528</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is one of the things that truly irks me about Palo Alto's IPS/IDS implementation... I have had a lot of experience with Snort/Sourcefire IDS products, and one huge leg up over other implementations I've seen in Sourcefire's Snort is the fact that the rules are easily browsable (except for very specific situations, where "shared object" rules were written to obfuscate the rule so that the rule can't be analyzed and have an exploit written for it - that's a corner case though). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It's very easy to determine if a given rule that fired off is a legitimate event or a false positive, because I can &lt;EM&gt;look at the rule that generated the event &lt;/EM&gt;with a PCAP open along side the rule, and determine if this traffic match was a false positive or not.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Both Check Point and PA should really "get the memo" on this... we as network security folks need to be able to see not just that some proprietary thing determined that there was "bad network traffic," but to see how the rule/signature was actually written.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 29 Apr 2013 13:12:04 GMT</pubDate>
    <dc:creator>ericgearhart</dc:creator>
    <dc:date>2013-04-29T13:12:04Z</dc:date>
    <item>
      <title>Vulnerability Vs Successful Expolit</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-vs-successful-expolit/m-p/46976#M34527</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would like to know how easy or hard it might be to link a vulnerability to an actual successful&amp;nbsp; exploit. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The threat details are provided below and a screenshot of the actual threat incident seen in attached. I am assuming this is just a random attempt at the recent timthumb attack. As I do not see the next stage which would have been , as I understand it , the download of the last.php. This I am guessing is a good example of a threat that was actively attempted but has not succeeded. Could someone give me examples where I can say a certainly exploit was certainly successful ?&amp;nbsp; &lt;/P&gt;&lt;TABLE style="border: 1px solid #aaaaaa; color: #252525; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;&lt;TBODY&gt;&lt;TR class="spaceunder" style="background-color: #d6e1e7;"&gt;&lt;TD style="padding-top: 5px; padding-bottom: 5px; border-left-width: 1px; border-left-style: solid; border-left-color: #aaaaaa; border-right-width: 1px; border-right-style: solid; border-right-color: #aaaaaa;"&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Attack Name&lt;/P&gt;&lt;/TD&gt;&lt;TD class="detail-field" style="padding-top: 5px; padding-bottom: 5px; border-left-width: 1px; border-left-style: solid; border-left-color: #aaaaaa; border-right-width: 1px; border-right-style: solid; border-right-color: #aaaaaa;"&gt;TimThumb Attack&lt;/TD&gt;&lt;/TR&gt;&lt;TR class="spaceunder"&gt;&lt;TD style="padding-top: 5px; padding-bottom: 5px; border-left-width: 1px; border-left-style: solid; border-left-color: #aaaaaa; border-right-width: 1px; border-right-style: solid; border-right-color: #aaaaaa;"&gt;Description&lt;/TD&gt;&lt;TD style="padding-top: 5px; padding-bottom: 5px; border-left-width: 1px; border-left-style: solid; border-left-color: #aaaaaa; border-right-width: 1px; border-right-style: solid; border-right-color: #aaaaaa;"&gt;TimThumb.php is prone to a remote command execution vulnerability while loading and storing remote files. The vulnerability is due to the fact that TimThumb.php allows files to be included from an array of allowed sites and keep copies of such files in the cache directory, located in the same folder as timthumb.php. An attacker could exploit the vulnerability by sending a crafted HTTP request. A successful attack could lead to remote code execution with the privileges of the web server.&lt;/TD&gt;&lt;/TR&gt;&lt;TR class="spaceunder" style="background-color: #d6e1e7;"&gt;&lt;TD style="padding-top: 5px; padding-bottom: 5px; border-left-width: 1px; border-left-style: solid; border-left-color: #aaaaaa; border-right-width: 1px; border-right-style: solid; border-right-color: #aaaaaa;"&gt;Threat ID&lt;/TD&gt;&lt;TD style="padding-top: 5px; padding-bottom: 5px; border-left-width: 1px; border-left-style: solid; border-left-color: #aaaaaa; border-right-width: 1px; border-right-style: solid; border-right-color: #aaaaaa;"&gt;35466&lt;/TD&gt;&lt;/TR&gt;&lt;TR class="spaceunder"&gt;&lt;TD style="padding-top: 5px; padding-bottom: 5px; border-left-width: 1px; border-left-style: solid; border-left-color: #aaaaaa; border-right-width: 1px; border-right-style: solid; border-right-color: #aaaaaa;"&gt;References&lt;/TD&gt;&lt;TD style="padding-top: 5px; padding-bottom: 5px; border-left-width: 1px; border-left-style: solid; border-left-color: #aaaaaa; border-right-width: 1px; border-right-style: solid; border-right-color: #aaaaaa;"&gt;&lt;A href="http://markmaunder.com/2011/08/02/technical-details-and-scripts-of-the-wordpress-timthumb-php-hack/" style="color: #505abc; text-decoration: underline;" target="_blank"&gt;http://markmaunder.com/2011/08/02/technical-details-and-scripts-of-the-wordpress-timthumb-php-hack/&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://code.google.com/p/timthumb/issues/detail?id=212" style="color: #505abc; text-decoration: underline;" target="_blank"&gt;http://code.google.com/p/timthumb/issues/detail?id=212&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://www.malwaredomainlist.com/forums/index.php?topic=4790.0" style="color: #505abc; text-decoration: underline;" target="_blank"&gt;http://www.malwaredomainlist.com/forums/index.php?topic=4790.0&lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR class="spaceunder" style="background-color: #d6e1e7;"&gt;&lt;TD style="padding-top: 5px; padding-bottom: 5px; border-left-width: 1px; border-left-style: solid; border-left-color: #aaaaaa; border-right-width: 1px; border-right-style: solid; border-right-color: #aaaaaa;"&gt;Severity&lt;/TD&gt;&lt;TD style="padding-top: 5px; padding-bottom: 5px; border-left-width: 1px; border-left-style: solid; border-left-color: #aaaaaa; border-right-width: 1px; border-right-style: solid; border-right-color: #aaaaaa;"&gt;high&lt;/TD&gt;&lt;/TR&gt;&lt;TR class="spaceunder"&gt;&lt;TD style="padding-top: 5px; padding-bottom: 5px; border-left-width: 1px; border-left-style: solid; border-left-color: #aaaaaa; border-right-width: 1px; border-right-style: solid; border-right-color: #aaaaaa;"&gt;Category&lt;/TD&gt;&lt;TD style="padding-top: 5px; padding-bottom: 5px; border-left-width: 1px; border-left-style: solid; border-left-color: #aaaaaa; border-right-width: 1px; border-right-style: solid; border-right-color: #aaaaaa;"&gt;code-execution&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sunil&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Apr 2013 11:29:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-vs-successful-expolit/m-p/46976#M34527</guid>
      <dc:creator>sunilsadanandan</dc:creator>
      <dc:date>2013-04-29T11:29:39Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Vs Successful Expolit</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-vs-successful-expolit/m-p/46977#M34528</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is one of the things that truly irks me about Palo Alto's IPS/IDS implementation... I have had a lot of experience with Snort/Sourcefire IDS products, and one huge leg up over other implementations I've seen in Sourcefire's Snort is the fact that the rules are easily browsable (except for very specific situations, where "shared object" rules were written to obfuscate the rule so that the rule can't be analyzed and have an exploit written for it - that's a corner case though). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It's very easy to determine if a given rule that fired off is a legitimate event or a false positive, because I can &lt;EM&gt;look at the rule that generated the event &lt;/EM&gt;with a PCAP open along side the rule, and determine if this traffic match was a false positive or not.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Both Check Point and PA should really "get the memo" on this... we as network security folks need to be able to see not just that some proprietary thing determined that there was "bad network traffic," but to see how the rule/signature was actually written.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Apr 2013 13:12:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-vs-successful-expolit/m-p/46977#M34528</guid>
      <dc:creator>ericgearhart</dc:creator>
      <dc:date>2013-04-29T13:12:04Z</dc:date>
    </item>
  </channel>
</rss>

