<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: vulnerability id 31327 in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-id-31327/m-p/132937#M47135</link>
    <description>&lt;P&gt;&lt;SPAN&gt;Reply from TAC&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;We&amp;nbsp;have&amp;nbsp;released&amp;nbsp;the&amp;nbsp;modification&amp;nbsp;to&amp;nbsp;signature&amp;nbsp;&amp;nbsp;(TID:&amp;nbsp;31327/&amp;nbsp;Attempted&amp;nbsp;Antivirus&amp;nbsp;Detection&amp;nbsp;Bypass&amp;nbsp;via&amp;nbsp;Malformed&amp;nbsp;ZIP&amp;nbsp;Archive)&amp;nbsp;in&amp;nbsp;content&amp;nbsp;version&amp;nbsp;646&amp;nbsp;on&amp;nbsp;12/13/2016.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 15 Dec 2016 01:44:53 GMT</pubDate>
    <dc:creator>nextgenhappines</dc:creator>
    <dc:date>2016-12-15T01:44:53Z</dc:date>
    <item>
      <title>vulnerability id 31327</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-id-31327/m-p/120549#M45940</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Start 10/13, &amp;nbsp;I have been getting medium threat alert for vulnerability id 31327 (&lt;SPAN&gt;Attempted Antivirus Detection Bypass via Malformed ZIP Archive). &amp;nbsp;I beleve it is my iOS devices connect to apple store to download app updates. &amp;nbsp;Anyone else sees these? &amp;nbsp;It is using the action is reset-both, but I still able to complete the download and install without any problem. &amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2016-10-22 at 7.13.09 AM.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/6019iBA87D47171F3FA68/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2016-10-22 at 7.13.09 AM.png" alt="Screen Shot 2016-10-22 at 7.13.09 AM.png" /&gt;&lt;/span&gt;﻿&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 22 Oct 2016 14:19:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-id-31327/m-p/120549#M45940</guid>
      <dc:creator>nextgenhappines</dc:creator>
      <dc:date>2016-10-22T14:19:29Z</dc:date>
    </item>
    <item>
      <title>Re: vulnerability id 31327</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-id-31327/m-p/120559#M45943</link>
      <description>&lt;P&gt;I have the same problem. &amp;nbsp;I ended up making a "permit itunes-base" security policy that points to a vulnerability protection profile with that specific signature disabled. &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 22 Oct 2016 15:19:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-id-31327/m-p/120559#M45943</guid>
      <dc:creator>jvalentine</dc:creator>
      <dc:date>2016-10-22T15:19:46Z</dc:date>
    </item>
    <item>
      <title>Re: vulnerability id 31327</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-id-31327/m-p/120608#M45952</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/22017"&gt;@jvalentine﻿&lt;/a&gt;&amp;nbsp;Thanks for confirming it. &amp;nbsp;The strange part that I don't understand is the app update is still successful. &amp;nbsp;Also, the file that is alerting are all from Apple Itune app store. &amp;nbsp;I will think " I can trust Apple?!?". &amp;nbsp; &amp;nbsp;I just want to know if this is a false positive or something real.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;E&lt;/P&gt;</description>
      <pubDate>Sat, 22 Oct 2016 23:46:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-id-31327/m-p/120608#M45952</guid>
      <dc:creator>nextgenhappines</dc:creator>
      <dc:date>2016-10-22T23:46:56Z</dc:date>
    </item>
    <item>
      <title>Re: vulnerability id 31327</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-id-31327/m-p/120615#M45955</link>
      <description>&lt;P&gt;I'm willing to bet it's a false-positive, because it's Apple, right? &amp;nbsp;I'd recommend opening a case with TAC. &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 23 Oct 2016 01:46:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-id-31327/m-p/120615#M45955</guid>
      <dc:creator>jvalentine</dc:creator>
      <dc:date>2016-10-23T01:46:41Z</dc:date>
    </item>
    <item>
      <title>Re: vulnerability id 31327</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-id-31327/m-p/132937#M47135</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Reply from TAC&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;We&amp;nbsp;have&amp;nbsp;released&amp;nbsp;the&amp;nbsp;modification&amp;nbsp;to&amp;nbsp;signature&amp;nbsp;&amp;nbsp;(TID:&amp;nbsp;31327/&amp;nbsp;Attempted&amp;nbsp;Antivirus&amp;nbsp;Detection&amp;nbsp;Bypass&amp;nbsp;via&amp;nbsp;Malformed&amp;nbsp;ZIP&amp;nbsp;Archive)&amp;nbsp;in&amp;nbsp;content&amp;nbsp;version&amp;nbsp;646&amp;nbsp;on&amp;nbsp;12/13/2016.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Dec 2016 01:44:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-id-31327/m-p/132937#M47135</guid>
      <dc:creator>nextgenhappines</dc:creator>
      <dc:date>2016-12-15T01:44:53Z</dc:date>
    </item>
    <item>
      <title>Re: vulnerability id 31327</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-id-31327/m-p/132950#M47136</link>
      <description>&lt;P&gt;My firewall installed that content version yesterday, but today I'm still getting false-positive hits for 31327 via itunes-base. &amp;nbsp;I count 15 hits just today. &amp;nbsp;Looks like the signature needs some additional work still. &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Dec 2016 05:32:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-id-31327/m-p/132950#M47136</guid>
      <dc:creator>jvalentine</dc:creator>
      <dc:date>2016-12-15T05:32:24Z</dc:date>
    </item>
    <item>
      <title>Re: vulnerability id 31327</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-id-31327/m-p/133096#M47164</link>
      <description>&lt;P&gt;Same here, TAC told me to use CLI to reinstall the 646 update again.&amp;nbsp; If it still does not work, perform another packet captures and update the case.&amp;nbsp;&amp;nbsp; I don't understand why TAC can't test it?&amp;nbsp; It is just iOS / Itune download app update from apple itune store.&amp;nbsp; It is easy to replicate.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;E&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Dec 2016 16:01:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-id-31327/m-p/133096#M47164</guid>
      <dc:creator>nextgenhappines</dc:creator>
      <dc:date>2016-12-15T16:01:24Z</dc:date>
    </item>
    <item>
      <title>Re: vulnerability id 31327</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-id-31327/m-p/135259#M47486</link>
      <description>&lt;P&gt;The signature is disabed on 650-3771. &amp;nbsp;According to TAC, there are too many false positive. &amp;nbsp;Not sure what is the future plan of this specific signature will be.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;E&lt;/P&gt;</description>
      <pubDate>Fri, 30 Dec 2016 19:03:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-id-31327/m-p/135259#M47486</guid>
      <dc:creator>nextgenhappines</dc:creator>
      <dc:date>2016-12-30T19:03:46Z</dc:date>
    </item>
  </channel>
</rss>

