<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Sig. 35646-0 SMB Transaction Parsing Vulnerability in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/sig-35646-0-smb-transaction-parsing-vulnerability/m-p/1811732#M55740</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We are also being affected by this one (just came on here to see if there were any answers!) so would definitely be interested in any updates you get - thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 12 Jan 2012 10:38:54 GMT</pubDate>
    <dc:creator>mitchen</dc:creator>
    <dc:date>2012-01-12T10:38:54Z</dc:date>
    <item>
      <title>Sig. 35646-0 SMB Transaction Parsing Vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/sig-35646-0-smb-transaction-parsing-vulnerability/m-p/1811725#M55728</link>
      <description>&lt;P&gt;Hello all, I searched on this one and didn't get any hits so here it goes.&amp;nbsp; I began receiving a flood of warnings from my IPS saying that signature 35646-0 was being triggered.&amp;nbsp; All of the attackers and victims are internal and they all revolve around our internal websites and developers who work on them.&amp;nbsp; All the servers and workstations are coming up clean on AV scans and I don't see any other examples of this signature being triggered.&amp;nbsp; Does anyone have any experience with this particular signature/threat, or any ideas on how I can determine if it's hopefully just a false-positive and not infected machines?&amp;nbsp; Thanks all.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Adam&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 12:34:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sig-35646-0-smb-transaction-parsing-vulnerability/m-p/1811725#M55728</guid>
      <dc:creator>deeznuts420</dc:creator>
      <dc:date>2019-03-10T12:34:47Z</dc:date>
    </item>
    <item>
      <title>Sig. 35646-0 SMB Transaction Parsing Vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/sig-35646-0-smb-transaction-parsing-vulnerability/m-p/1811726#M55729</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Adam,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have the same issue however, I've narrowed mine down to synchronization software I'm using between a server at my DC and my local network. When I turn the sync app off the alerts stop. I've been running this process for years so this alert came out of the blue and I thought it was an attack at first.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When did yours start? Mine started on Friday afternoon so I'm assuming it is something to do with a signature update pushed out then.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could anyone else shed any light on this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards, Damian.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG id="smallDivTip" src="chrome://dictionarytip/skin/dtipIconHover.png" style="z-index: 90; border: 0px solid blue; position: absolute; left: 648px; top: 120px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jan 2012 16:29:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sig-35646-0-smb-transaction-parsing-vulnerability/m-p/1811726#M55729</guid>
      <dc:creator>Damian Coverly</dc:creator>
      <dc:date>2012-01-10T16:29:19Z</dc:date>
    </item>
    <item>
      <title>Sig. 35646-0 SMB Transaction Parsing Vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/sig-35646-0-smb-transaction-parsing-vulnerability/m-p/1811727#M55730</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you know what signature pack was applied on that Friday, you can look in the release notes to see if that signature has been added (new signatures are usually the noisiest) or changed. You can also edit the signature to grab a packet capture of the traffic and see if it is doing what the signature is warning you about.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Bob&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jan 2012 18:36:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sig-35646-0-smb-transaction-parsing-vulnerability/m-p/1811727#M55730</guid>
      <dc:creator>rhermes</dc:creator>
      <dc:date>2012-01-10T18:36:50Z</dc:date>
    </item>
    <item>
      <title>Sig. 35646-0 SMB Transaction Parsing Vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/sig-35646-0-smb-transaction-parsing-vulnerability/m-p/1811728#M55734</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey Damian, mine began on Thursday, 1/5/12 around 3:00 PM EST.&amp;nbsp; So far, I've narrowed it down to SMB traffic between our web servers, and the web programmers/designers.&amp;nbsp; I have also noticed a few DCs of ours as victims as well, I would assume that was due to SYSVOL access for GP updates, etc by the clients.&amp;nbsp; I do find it interesting that we're showing similar symptoms though.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;@rhermes, I actually have our IPS setup to forward me a copy of the offending packet and sure enough I can see the code/text/patterns that are triggering the sig however, it appears to be encrypted and therefore doesn't really shine any light on what could be causing it.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jan 2012 20:05:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sig-35646-0-smb-transaction-parsing-vulnerability/m-p/1811728#M55734</guid>
      <dc:creator>deeznuts420</dc:creator>
      <dc:date>2012-01-10T20:05:50Z</dc:date>
    </item>
    <item>
      <title>Re: Sig. 35646-0 SMB Transaction Parsing Vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/sig-35646-0-smb-transaction-parsing-vulnerability/m-p/1811729#M55737</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To me, this is a great example of how Cisco is horrible at releasing up-to-date signatures.&amp;nbsp; This signature is for a vulnerability that is approaching a year old now (Microsoft released a security bulletin on April 12st 2011 (1)), and was just released by Cisco last week(2).&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you're like everyone else, your servers should already be patched and this really a non-issue (for impact anyway).&amp;nbsp; But now I'm getting 200 alerts every 10 minutes because Cisco in their infinite wisdom decided to &lt;EM&gt;finally&lt;/EM&gt; release a sig for this. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Being that Cisco hasn't disclosed, or allowed me to see, the regex setting for this STRING-TCP sig, I have no way of knowing what this signature is even alerting on.&amp;nbsp; For all I know, they are looking for "[sS][mM][Bb]" in a packet with a dst port of 139 or 445, which would make this sig total crap. Now I have to go through and figure out what is causing this signature to fire, make sure it's not malicious, and then either tune this sig, or more than likely disable it.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;1) &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://technet.microsoft.com/en-us/security/bulletin/ms11-020"&gt;https://technet.microsoft.com/en-us/security/bulletin/ms11-020&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;2) &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=35646&amp;amp;signatureSubId=0&amp;amp;softwareVersion=6.0&amp;amp;releaseVersion=S615"&gt;http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=35646&amp;amp;signatureSubId=0&amp;amp;softwareVersion=6.0&amp;amp;releaseVersion=S615&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jan 2012 21:28:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sig-35646-0-smb-transaction-parsing-vulnerability/m-p/1811729#M55737</guid>
      <dc:creator>murphy.brandon</dc:creator>
      <dc:date>2012-01-10T21:28:20Z</dc:date>
    </item>
    <item>
      <title>Sig. 35646-0 SMB Transaction Parsing Vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/sig-35646-0-smb-transaction-parsing-vulnerability/m-p/1811730#M55738</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;FYI - I've got about 8 packet captures of this, 5 of which have full SMB sessions.&amp;nbsp; I'll be opening a ticket with Cisco tomorrow to figure out why this signature is firing so often, I'm sure there are some benign triggers.&amp;nbsp; I'll keep you guys updated.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jan 2012 23:16:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sig-35646-0-smb-transaction-parsing-vulnerability/m-p/1811730#M55738</guid>
      <dc:creator>murphy.brandon</dc:creator>
      <dc:date>2012-01-10T23:16:02Z</dc:date>
    </item>
    <item>
      <title>Sig. 35646-0 SMB Transaction Parsing Vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/sig-35646-0-smb-transaction-parsing-vulnerability/m-p/1811731#M55739</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That's excellent Brandon, thanks for opening the ticket and keeping us in the loop. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jan 2012 23:33:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sig-35646-0-smb-transaction-parsing-vulnerability/m-p/1811731#M55739</guid>
      <dc:creator>deeznuts420</dc:creator>
      <dc:date>2012-01-10T23:33:34Z</dc:date>
    </item>
    <item>
      <title>Re: Sig. 35646-0 SMB Transaction Parsing Vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/sig-35646-0-smb-transaction-parsing-vulnerability/m-p/1811732#M55740</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We are also being affected by this one (just came on here to see if there were any answers!) so would definitely be interested in any updates you get - thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jan 2012 10:38:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sig-35646-0-smb-transaction-parsing-vulnerability/m-p/1811732#M55740</guid>
      <dc:creator>mitchen</dc:creator>
      <dc:date>2012-01-12T10:38:54Z</dc:date>
    </item>
    <item>
      <title>Sig. 35646-0 SMB Transaction Parsing Vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/sig-35646-0-smb-transaction-parsing-vulnerability/m-p/1811733#M55741</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'll provide a quick update on my ticket.&amp;nbsp; Ticket is open and pcaps have been provided.&amp;nbsp; I specially asked the following questions after getting a disappointing inital response.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-----------------------------------------------------------------------------------&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;•1)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Have you found the specially-crafted SMB requests in any of the packet captures? &lt;/LI&gt;&lt;LI&gt;•2)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; If not , can you validate that this signature is firing alerts on benign traffic and are false positives? &lt;/LI&gt;&lt;LI&gt;•3)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; If so, can you confirm this traffic is actually malicious in nature and are true positives? &lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Based on the provided packet captures and the volume of alerts, this signature appears to be susceptible to false positives in windows environments.&amp;nbsp; This is not depicted on the following link, which clearly states “There are no known benign triggers.” and “There are no suggested filters.”&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=35646&amp;amp;signatureSubId=0&amp;amp;softwareVersion=6.0&amp;amp;releaseVersion=S615"&gt;http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=35646&amp;amp;signatureSubId=0&amp;amp;softwareVersion=6.0&amp;amp;releaseVersion=S615&lt;/A&gt;&lt;/P&gt;&lt;P&gt;----------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I"m still waiting for a response on that.&amp;nbsp; If there are any other questions anyone has, feel free to let me know and i'll add them to the ticket. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jan 2012 16:07:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sig-35646-0-smb-transaction-parsing-vulnerability/m-p/1811733#M55741</guid>
      <dc:creator>murphy.brandon</dc:creator>
      <dc:date>2012-01-12T16:07:37Z</dc:date>
    </item>
    <item>
      <title>Sig. 35646-0 SMB Transaction Parsing Vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/sig-35646-0-smb-transaction-parsing-vulnerability/m-p/1811734#M55742</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the update Brandon - I think those 3 questions you asked should give us a good idea on how to proceed, assuming Cisco can answer them with some authority &lt;SPAN __jive_emoticon_name="wink" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/wink.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jan 2012 16:38:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sig-35646-0-smb-transaction-parsing-vulnerability/m-p/1811734#M55742</guid>
      <dc:creator>deeznuts420</dc:creator>
      <dc:date>2012-01-12T16:38:23Z</dc:date>
    </item>
    <item>
      <title>Sig. 35646-0 SMB Transaction Parsing Vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/sig-35646-0-smb-transaction-parsing-vulnerability/m-p/1811735#M55743</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The Signature team is currently looking into this issue. I will keep the forum updated with the results.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Jan 2012 20:27:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sig-35646-0-smb-transaction-parsing-vulnerability/m-p/1811735#M55743</guid>
      <dc:creator>ruppala</dc:creator>
      <dc:date>2012-01-13T20:27:00Z</dc:date>
    </item>
    <item>
      <title>Sig. 35646-0 SMB Transaction Parsing Vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/sig-35646-0-smb-transaction-parsing-vulnerability/m-p/1811736#M55744</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Same with us, looks like they started on 01/05/2012 and have been firing ever since on a daily basis.&amp;nbsp; Anxiously awaiting an answer. Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Jan 2012 20:32:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sig-35646-0-smb-transaction-parsing-vulnerability/m-p/1811736#M55744</guid>
      <dc:creator>lukeprimm</dc:creator>
      <dc:date>2012-01-13T20:32:35Z</dc:date>
    </item>
    <item>
      <title>Sig. 35646-0 SMB Transaction Parsing Vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/sig-35646-0-smb-transaction-parsing-vulnerability/m-p/1811737#M55745</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear,&lt;/P&gt;&lt;P&gt;I am also the same problem, has any news on this issues?. Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Jan 2012 19:35:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sig-35646-0-smb-transaction-parsing-vulnerability/m-p/1811737#M55745</guid>
      <dc:creator>mfurgiuele.maiten</dc:creator>
      <dc:date>2012-01-16T19:35:35Z</dc:date>
    </item>
    <item>
      <title>Sig. 35646-0 SMB Transaction Parsing Vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/sig-35646-0-smb-transaction-parsing-vulnerability/m-p/1811738#M55746</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Unfortunately there hasn't been much progress made on my ticket. I've requested that the ticket be escalated to signature developers. Hopefully some more progress we made on the ticket soon I will keep you all updated.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Jan 2012 21:50:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sig-35646-0-smb-transaction-parsing-vulnerability/m-p/1811738#M55746</guid>
      <dc:creator>murphy.brandon</dc:creator>
      <dc:date>2012-01-16T21:50:52Z</dc:date>
    </item>
    <item>
      <title>Sig. 35646-0 SMB Transaction Parsing Vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/sig-35646-0-smb-transaction-parsing-vulnerability/m-p/1811739#M55747</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The signature team is actively looking into this and will release a sigupdate soon to address this. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Jan 2012 23:07:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sig-35646-0-smb-transaction-parsing-vulnerability/m-p/1811739#M55747</guid>
      <dc:creator>ruppala</dc:creator>
      <dc:date>2012-01-16T23:07:10Z</dc:date>
    </item>
    <item>
      <title>Sig. 35646-0 SMB Transaction Parsing Vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/sig-35646-0-smb-transaction-parsing-vulnerability/m-p/1811740#M55748</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the update - when you have an ETA on those new sigs, we'd love to hear it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jan 2012 01:44:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sig-35646-0-smb-transaction-parsing-vulnerability/m-p/1811740#M55748</guid>
      <dc:creator>deeznuts420</dc:creator>
      <dc:date>2012-01-17T01:44:47Z</dc:date>
    </item>
    <item>
      <title>Sig. 35646-0 SMB Transaction Parsing Vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/sig-35646-0-smb-transaction-parsing-vulnerability/m-p/1811741#M55749</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; We faced the same issue, in our case the victim was our Windows File server Running of a Windows Server 2008 standard edition. Both the clients and servers are up to date on the patching. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Due to the high alerts and limited time, we tuned the signature so it dropped the offending packets. Soon after we started to receive complaints from the users that they couldnt save files to the file server any more, after removing the drop action the problem was fixed. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Its clear that this is a false-positive, and hope its fixed with the next signature release. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jan 2012 11:44:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sig-35646-0-smb-transaction-parsing-vulnerability/m-p/1811741#M55749</guid>
      <dc:creator>rkirkeby</dc:creator>
      <dc:date>2012-01-17T11:44:12Z</dc:date>
    </item>
    <item>
      <title>Sig. 35646-0 SMB Transaction Parsing Vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/sig-35646-0-smb-transaction-parsing-vulnerability/m-p/1811742#M55750</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The Cisco Support Engineer told us: "I would like to let you know that there are some modifications being made to this signature and pushed out in the next release cycle as most of the time it has been a false alarm."&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Jan 2012 16:36:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sig-35646-0-smb-transaction-parsing-vulnerability/m-p/1811742#M55750</guid>
      <dc:creator>patricio.biggeri</dc:creator>
      <dc:date>2012-01-20T16:36:07Z</dc:date>
    </item>
    <item>
      <title>Re: Sig. 35646-0 SMB Transaction Parsing Vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/sig-35646-0-smb-transaction-parsing-vulnerability/m-p/1811743#M55751</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;A higher fidelity version of signature 35646-0 is going through the release process and should be out shortly.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Jan 2012 19:57:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sig-35646-0-smb-transaction-parsing-vulnerability/m-p/1811743#M55751</guid>
      <dc:creator>ruppala</dc:creator>
      <dc:date>2012-01-20T19:57:50Z</dc:date>
    </item>
    <item>
      <title>Sig. 35646-0 SMB Transaction Parsing Vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/sig-35646-0-smb-transaction-parsing-vulnerability/m-p/1811744#M55752</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;While I haven't heard anything regarding the ticket, I did just get a notification of S621, which includes the updated sig.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://tools.cisco.com/security/center/viewBulletin.x?bId=437&amp;amp;year=2012"&gt;http://tools.cisco.com/security/center/viewBulletin.x?bId=437&amp;amp;year=2012&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 21 Jan 2012 02:46:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sig-35646-0-smb-transaction-parsing-vulnerability/m-p/1811744#M55752</guid>
      <dc:creator>murphy.brandon</dc:creator>
      <dc:date>2012-01-21T02:46:52Z</dc:date>
    </item>
  </channel>
</rss>

