<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic CSA: Bufferoverflow exposed. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/csa-bufferoverflow-exposed/m-p/728592#M86993</link>
    <description>&lt;P&gt;I am looking into the bufferoverflow events in CSA and need your assistance in this one.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the event:&lt;/P&gt;&lt;P&gt;The application 'C:\Program Files\Internet Explorer\iexplore.exe' (***) tried to call the function VirtualProtectEx("&amp;lt;self&amp;gt;") from a buffer (the return address was 0x7c108ec9). The code at this address is 'ff7510ff 750cff75 086affe8 75ffffff 5dc21000 90909090 90e9733c 9093807c' &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this action is very suspicious since the VirtualProtectEx function changes the access protection on a region of committed pages in the virtual address space of a specified process.?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it possible to figure out what does the code 'ff7510ff 750cff75 086affe8 75ffffff 5dc21000 90909090 90e9733c 9093807c' means? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks&lt;/P&gt;</description>
    <pubDate>Sun, 10 Mar 2019 10:33:49 GMT</pubDate>
    <dc:creator>fkhan6_wb</dc:creator>
    <dc:date>2019-03-10T10:33:49Z</dc:date>
    <item>
      <title>CSA: Bufferoverflow exposed.</title>
      <link>https://community.cisco.com/t5/network-security/csa-bufferoverflow-exposed/m-p/728592#M86993</link>
      <description>&lt;P&gt;I am looking into the bufferoverflow events in CSA and need your assistance in this one.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the event:&lt;/P&gt;&lt;P&gt;The application 'C:\Program Files\Internet Explorer\iexplore.exe' (***) tried to call the function VirtualProtectEx("&amp;lt;self&amp;gt;") from a buffer (the return address was 0x7c108ec9). The code at this address is 'ff7510ff 750cff75 086affe8 75ffffff 5dc21000 90909090 90e9733c 9093807c' &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this action is very suspicious since the VirtualProtectEx function changes the access protection on a region of committed pages in the virtual address space of a specified process.?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it possible to figure out what does the code 'ff7510ff 750cff75 086affe8 75ffffff 5dc21000 90909090 90e9733c 9093807c' means? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 10:33:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/csa-bufferoverflow-exposed/m-p/728592#M86993</guid>
      <dc:creator>fkhan6_wb</dc:creator>
      <dc:date>2019-03-10T10:33:49Z</dc:date>
    </item>
    <item>
      <title>Re: CSA: Bufferoverflow exposed.</title>
      <link>https://community.cisco.com/t5/network-security/csa-bufferoverflow-exposed/m-p/728593#M86998</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have a machine that got the exact same message (including the code address) and it was the same day they installed a Tomcat Web server and Spyware Doctor.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I believe Spyware Doctor was the culprit in my case.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tom S&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Apr 2007 22:24:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/csa-bufferoverflow-exposed/m-p/728593#M86998</guid>
      <dc:creator>tsteger1</dc:creator>
      <dc:date>2007-04-12T22:24:52Z</dc:date>
    </item>
  </channel>
</rss>

