<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Traffic pattern of threat ID 38643 in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/traffic-pattern-of-threat-id-38643/m-p/298886#M78285</link>
    <description>&lt;P&gt;Palo Alto Networks does not provide the intellectual property of how their signature are created.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;If you feel this is a false positive, please feel free to whitelist this ID number, while opening a ticket with PANW support to determine root cause.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The forum members here would not be able to complete your request for what the pattern would look like.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 15 Nov 2019 20:22:51 GMT</pubDate>
    <dc:creator>S.Cantwell</dc:creator>
    <dc:date>2019-11-15T20:22:51Z</dc:date>
    <item>
      <title>Traffic pattern of threat ID 38643</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/traffic-pattern-of-threat-id-38643/m-p/298780#M78261</link>
      <description>&lt;P&gt;Wavelink Emulation License Server HTTP Header Processing Heap Buffer Overflow Vulnerability' generated by PAN NGFW detected on host 10.10.10.1. " Vulnerability Exploit Detection (hostname:8081/)"&lt;/P&gt;&lt;P&gt;We have customer asking what is the traffic pattern that triggers this.&lt;BR /&gt;What is the traffic pattern that triggers this alert?&lt;BR /&gt;We are trying to narrow down what is causing this alert to occur.&lt;BR /&gt;Server is running Microsoft master data services on port 8081.&lt;BR /&gt;There is no Wavelink software installed.&lt;/P&gt;&lt;P&gt;Customer Comments:&amp;nbsp;&lt;SPAN&gt;"we are running MS SQL server enterprise (2016) on this server,&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;The component which is used is Microsoft master data services (MDS), this comes as part of the SQL server installation."&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Nov 2019 09:28:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/traffic-pattern-of-threat-id-38643/m-p/298780#M78261</guid>
      <dc:creator>JuusoMartin</dc:creator>
      <dc:date>2019-11-15T09:28:56Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic pattern of threat ID 38643</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/traffic-pattern-of-threat-id-38643/m-p/298886#M78285</link>
      <description>&lt;P&gt;Palo Alto Networks does not provide the intellectual property of how their signature are created.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;If you feel this is a false positive, please feel free to whitelist this ID number, while opening a ticket with PANW support to determine root cause.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The forum members here would not be able to complete your request for what the pattern would look like.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Nov 2019 20:22:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/traffic-pattern-of-threat-id-38643/m-p/298886#M78285</guid>
      <dc:creator>S.Cantwell</dc:creator>
      <dc:date>2019-11-15T20:22:51Z</dc:date>
    </item>
  </channel>
</rss>

