<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic AWS Servers trigger Vulnerability in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/aws-servers-trigger-vulnerability/m-p/68901#M40085</link>
    <description>&lt;P&gt;We are seeing a high number of HTTP Non RFC-Compliant Response Found&lt;/P&gt;
&lt;P&gt;Signature ID : 32880&amp;nbsp; CVE-2010-2561&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;All are logged from aws servers, evenly distributed across a large number of servers - 173 in one hour, each with 300-500 hits.&amp;nbsp; I have packet captured the vulnerability and it is logging a seemingly innocuous XML file.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I suspect this is not a problem, but is something amazon have set up on their servers which is causing false positives against this signature.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;the data returned is this:&lt;/P&gt;
&lt;P&gt;&amp;lt;? xml version="1.0 "?&amp;gt;&lt;/P&gt;
&lt;P&gt;&amp;lt;cross-domain-policy&amp;gt;&lt;/P&gt;
&lt;P&gt;&amp;lt;allow-access-from domain="*" to-ports="*" /&amp;gt;&lt;/P&gt;
&lt;P&gt;&amp;lt;/cross-domain-policy&amp;gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It's not causing a problem, but it's showing as more than 25% of all my vulnerabilities so it's masking other issues.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Do PAN watch this?&amp;nbsp; If not how do we feed back regarding signatures?&lt;/P&gt;</description>
    <pubDate>Wed, 02 Dec 2015 11:04:50 GMT</pubDate>
    <dc:creator>djr</dc:creator>
    <dc:date>2015-12-02T11:04:50Z</dc:date>
    <item>
      <title>AWS Servers trigger Vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/aws-servers-trigger-vulnerability/m-p/68901#M40085</link>
      <description>&lt;P&gt;We are seeing a high number of HTTP Non RFC-Compliant Response Found&lt;/P&gt;
&lt;P&gt;Signature ID : 32880&amp;nbsp; CVE-2010-2561&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;All are logged from aws servers, evenly distributed across a large number of servers - 173 in one hour, each with 300-500 hits.&amp;nbsp; I have packet captured the vulnerability and it is logging a seemingly innocuous XML file.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I suspect this is not a problem, but is something amazon have set up on their servers which is causing false positives against this signature.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;the data returned is this:&lt;/P&gt;
&lt;P&gt;&amp;lt;? xml version="1.0 "?&amp;gt;&lt;/P&gt;
&lt;P&gt;&amp;lt;cross-domain-policy&amp;gt;&lt;/P&gt;
&lt;P&gt;&amp;lt;allow-access-from domain="*" to-ports="*" /&amp;gt;&lt;/P&gt;
&lt;P&gt;&amp;lt;/cross-domain-policy&amp;gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It's not causing a problem, but it's showing as more than 25% of all my vulnerabilities so it's masking other issues.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Do PAN watch this?&amp;nbsp; If not how do we feed back regarding signatures?&lt;/P&gt;</description>
      <pubDate>Wed, 02 Dec 2015 11:04:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/aws-servers-trigger-vulnerability/m-p/68901#M40085</guid>
      <dc:creator>djr</dc:creator>
      <dc:date>2015-12-02T11:04:50Z</dc:date>
    </item>
    <item>
      <title>Re: AWS Servers trigger Vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/aws-servers-trigger-vulnerability/m-p/68921#M40091</link>
      <description>&lt;P&gt;Best way I know is open a case requesting a false positive analysis.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Wed, 02 Dec 2015 14:29:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/aws-servers-trigger-vulnerability/m-p/68921#M40091</guid>
      <dc:creator>glastra1</dc:creator>
      <dc:date>2015-12-02T14:29:58Z</dc:date>
    </item>
    <item>
      <title>Re: AWS Servers trigger Vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/aws-servers-trigger-vulnerability/m-p/68925#M40092</link>
      <description>&lt;P&gt;Thanks, that's what I expected and now having phrased my question correctly, my support partner is doing just that.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Wed, 02 Dec 2015 15:06:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/aws-servers-trigger-vulnerability/m-p/68925#M40092</guid>
      <dc:creator>djr</dc:creator>
      <dc:date>2015-12-02T15:06:52Z</dc:date>
    </item>
  </channel>
</rss>

