<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPS Signatures in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ips-signatures/m-p/202549#M59755</link>
    <description>&lt;P&gt;Sorry but, If I understood:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This CVEs were active for a while but Palo Alto erase it from its signatures because with updating the host application made it-self non exploitable by this methods?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks and regards.&lt;/P&gt;</description>
    <pubDate>Tue, 27 Feb 2018 15:14:20 GMT</pubDate>
    <dc:creator>Manuben88</dc:creator>
    <dc:date>2018-02-27T15:14:20Z</dc:date>
    <item>
      <title>IPS Signatures</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ips-signatures/m-p/202475#M59735</link>
      <description>&lt;P&gt;Hello friends,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have some signatures with fortigate names and I neet to know the equivalence in Palo Alto, by the CVE Palo Alto dont indentify it, could anyone help me?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;web_app3: Narcissus.Image.Configuration.Remote.Command.Execution&lt;BR /&gt;CVE-2015-1579 CVE-2014-9734&lt;BR /&gt;&lt;BR /&gt;applications3: Ektron.XSLT.Transform.Remote.Code.Execution&lt;BR /&gt;CVE-2012-5357&lt;BR /&gt;&lt;BR /&gt;applications3: OpenVAS.Web.Scanner&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thankss&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Feb 2018 10:49:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ips-signatures/m-p/202475#M59735</guid>
      <dc:creator>Manuben88</dc:creator>
      <dc:date>2018-02-27T10:49:28Z</dc:date>
    </item>
    <item>
      <title>Re: IPS Signatures</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ips-signatures/m-p/202483#M59736</link>
      <description>&lt;P&gt;Are these CVE still active in the wild?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If CVE's are no longer active in the wild, or have long been patched, they are removed from the PANW threat vault to make way for more current signatures&lt;/P&gt;</description>
      <pubDate>Tue, 27 Feb 2018 11:09:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ips-signatures/m-p/202483#M59736</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2018-02-27T11:09:47Z</dc:date>
    </item>
    <item>
      <title>Re: IPS Signatures</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ips-signatures/m-p/202538#M59748</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/83416"&gt;@Manuben88&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;All of these CVEs you've identified, as&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;&amp;nbsp;made note to, have been addressed by software updates for a while. If you are still running software that this actually covers I would HIGHLY recommend that you update them to something current.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ektron has been packed for literally years, the first two threats that you mention are only on select themes and only two of the affected themes are under active developement with patched versions.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would say that this is mostly a 'non-issue' for the most part. You shouldn't actually&amp;nbsp;&lt;EM&gt;need&lt;/EM&gt; these signatures anymore.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Feb 2018 14:17:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ips-signatures/m-p/202538#M59748</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-02-27T14:17:12Z</dc:date>
    </item>
    <item>
      <title>Re: IPS Signatures</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ips-signatures/m-p/202549#M59755</link>
      <description>&lt;P&gt;Sorry but, If I understood:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This CVEs were active for a while but Palo Alto erase it from its signatures because with updating the host application made it-self non exploitable by this methods?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks and regards.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Feb 2018 15:14:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ips-signatures/m-p/202549#M59755</guid>
      <dc:creator>Manuben88</dc:creator>
      <dc:date>2018-02-27T15:14:20Z</dc:date>
    </item>
    <item>
      <title>Re: IPS Signatures</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ips-signatures/m-p/202552#M59757</link>
      <description>&lt;P&gt;In short: yes&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The longer version is: To ensure we are able to scan traffic quickly it is efficient to kjeep the threat database small in size: To be able to provide the best possible coverage we investigate which signatures are active 'in the wild', which ones are dangerous and which ones are still relevant&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If a vulnerability is widely patched, it is safe to assume the threat level becomes lower, and if the signature is not picked up in the wild much any more, that means the signature has become obsolete and it is safe to dselete from the repository,, thus ensuring only the important signatures are used to scan your traffic&lt;/P&gt;</description>
      <pubDate>Tue, 27 Feb 2018 15:41:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ips-signatures/m-p/202552#M59757</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2018-02-27T15:41:11Z</dc:date>
    </item>
  </channel>
</rss>

