<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Sudden Windows DCOM Overflow flood in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/sudden-windows-dcom-overflow-flood/m-p/939778#M79642</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I had the same issue. Just disabled the new signature and wait for better days. as of the new signature sets 341 I see 3 new signatures already disabled. I guess with the next update these new that give us headache will be tuned also&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 26 Jun 2008 06:25:32 GMT</pubDate>
    <dc:creator>rnaydenov</dc:creator>
    <dc:date>2008-06-26T06:25:32Z</dc:date>
    <item>
      <title>Sudden Windows DCOM Overflow flood</title>
      <link>https://community.cisco.com/t5/network-security/sudden-windows-dcom-overflow-flood/m-p/939777#M79640</link>
      <description>&lt;P&gt;Today, ips-4250-sx (not-in-line) upgraded from v6.0(4)E1 to 6.0(5)E2. (S335) to (S339)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1st appearance &amp;amp; flood of red alerts,&lt;/P&gt;&lt;P&gt;all internal sources and destinations:&lt;/P&gt;&lt;P&gt;1) Windows DCOM Overflow 0&amp;amp;1 subsigs:&lt;/P&gt;&lt;P&gt; (1100src/100dst=86k total hits)&lt;/P&gt;&lt;P&gt;2) Netware LSASS CIFS.NLM Driver Overflow: (145src/140dst=2.5k total hits)&lt;/P&gt;&lt;P&gt;3) Print Spooler Service Overflow: (140src/75dst=2.4k total hits)&lt;/P&gt;&lt;P&gt;- hit accumulation in 7hrs since upgrade&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there some signature tweaking to be done? or is it TAC time?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anybody else experience this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-thanks for any advise &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Will&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 11:09:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sudden-windows-dcom-overflow-flood/m-p/939777#M79640</guid>
      <dc:creator>wgorman</dc:creator>
      <dc:date>2019-03-10T11:09:55Z</dc:date>
    </item>
    <item>
      <title>Re: Sudden Windows DCOM Overflow flood</title>
      <link>https://community.cisco.com/t5/network-security/sudden-windows-dcom-overflow-flood/m-p/939778#M79642</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I had the same issue. Just disabled the new signature and wait for better days. as of the new signature sets 341 I see 3 new signatures already disabled. I guess with the next update these new that give us headache will be tuned also&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Jun 2008 06:25:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sudden-windows-dcom-overflow-flood/m-p/939778#M79642</guid>
      <dc:creator>rnaydenov</dc:creator>
      <dc:date>2008-06-26T06:25:32Z</dc:date>
    </item>
    <item>
      <title>Re: Sudden Windows DCOM Overflow flood</title>
      <link>https://community.cisco.com/t5/network-security/sudden-windows-dcom-overflow-flood/m-p/939779#M79644</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Will,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes same signatures are firing after S339 and Engine Update! I am quite sure that these are False positives because Windows DCOM BO fires against Domain Controller (I checked and they are healty). Moreover these sig.s started firing just after the update!&lt;/P&gt;&lt;P&gt;I think Cisco is going to tune S339 sig.s.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anybody else experience this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Marco&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Jun 2008 07:36:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sudden-windows-dcom-overflow-flood/m-p/939779#M79644</guid>
      <dc:creator>soc_admin</dc:creator>
      <dc:date>2008-06-26T07:36:42Z</dc:date>
    </item>
    <item>
      <title>Re: Sudden Windows DCOM Overflow flood</title>
      <link>https://community.cisco.com/t5/network-security/sudden-windows-dcom-overflow-flood/m-p/939780#M79647</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Will,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The IPS team is aware of this issue and investigating. An upcoming sig update will address these sigs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Shiva&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Jun 2008 13:43:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sudden-windows-dcom-overflow-flood/m-p/939780#M79647</guid>
      <dc:creator>shivapd</dc:creator>
      <dc:date>2008-06-26T13:43:55Z</dc:date>
    </item>
    <item>
      <title>Re: Sudden Windows DCOM Overflow flood</title>
      <link>https://community.cisco.com/t5/network-security/sudden-windows-dcom-overflow-flood/m-p/939781#M79650</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Shiva,&lt;/P&gt;&lt;P&gt;What is your recommendation?&lt;/P&gt;&lt;P&gt;disable or not&lt;/P&gt;&lt;P&gt;What is the ETA for the sig update?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Will&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Jun 2008 14:24:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sudden-windows-dcom-overflow-flood/m-p/939781#M79650</guid>
      <dc:creator>wgorman</dc:creator>
      <dc:date>2008-06-26T14:24:33Z</dc:date>
    </item>
    <item>
      <title>Re: Sudden Windows DCOM Overflow flood</title>
      <link>https://community.cisco.com/t5/network-security/sudden-windows-dcom-overflow-flood/m-p/939782#M79651</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I got the same problem after upgrade to 5.1.7E2.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Jun 2008 13:37:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sudden-windows-dcom-overflow-flood/m-p/939782#M79651</guid>
      <dc:creator>andytmn</dc:creator>
      <dc:date>2008-06-27T13:37:49Z</dc:date>
    </item>
    <item>
      <title>Re: Sudden Windows DCOM Overflow flood</title>
      <link>https://community.cisco.com/t5/network-security/sudden-windows-dcom-overflow-flood/m-p/939783#M79652</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We believe we've identified an engine issue that affects signatures 5588-0,1 and 6769-0. It looks like the easiest work around is to just add the parameter smb command: 37 to the signatures. Due to the nature of the issue detection should not be affected in a negative way. We plan to ship this change in a signature update next week.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Jun 2008 18:12:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sudden-windows-dcom-overflow-flood/m-p/939783#M79652</guid>
      <dc:creator>craiwill</dc:creator>
      <dc:date>2008-06-27T18:12:42Z</dc:date>
    </item>
    <item>
      <title>Re: Sudden Windows DCOM Overflow flood</title>
      <link>https://community.cisco.com/t5/network-security/sudden-windows-dcom-overflow-flood/m-p/939784#M79653</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;How about No.3 the Print Spooler Overflow. Sig 5565. Same workaround ? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Aug 2008 12:12:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sudden-windows-dcom-overflow-flood/m-p/939784#M79653</guid>
      <dc:creator>david.enenkel</dc:creator>
      <dc:date>2008-08-29T12:12:32Z</dc:date>
    </item>
    <item>
      <title>Re: Sudden Windows DCOM Overflow flood</title>
      <link>https://community.cisco.com/t5/network-security/sudden-windows-dcom-overflow-flood/m-p/939785#M79654</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;All of these were fixed in S342 I think:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The S342 signature update contains the following modified signature:&lt;/P&gt;&lt;P&gt;PLATFORM 	SIGID  	SIGNAME     	ENGINE 	SEVERITY 	ENABLED 	DDTS&lt;/P&gt;&lt;P&gt;5.x, 6.x 	5565.4 	Print Spooler Service Overflow 	SERVICE-SMB-ADVANCED 	High 	True 	CSCsq99671&lt;/P&gt;&lt;P&gt;5.x, 6.x 	5588.0 	Windows DCOM Overflow 	SERVICE-SMB-ADVANCED 	High 	True 	CSCsq99671&lt;/P&gt;&lt;P&gt;5.x, 6.x 	5588.1 	Windows DCOM Overflow 	SERVICE-SMB-ADVANCED 	High 	True 	CSCsq99671&lt;/P&gt;&lt;P&gt;5.x, 6.x 	6769.0 	Netware LSASS CIFS.NLM Driver Overflow 	SERVICE-SMB-ADVANCED 	High 	True 	CSCsq99671&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Aug 2008 12:29:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sudden-windows-dcom-overflow-flood/m-p/939785#M79654</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-08-29T12:29:27Z</dc:date>
    </item>
  </channel>
</rss>

