<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: MS .ANI Exploit in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ms-ani-exploit/m-p/766293#M87116</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok well first off the signature has information you can review:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://tools.cisco.com/MySDN/Intelligence/viewThreat.x?threatId=5384" target="_blank"&gt;http://tools.cisco.com/MySDN/Intelligence/viewThreat.x?threatId=5384&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Updated Microsoft advisory:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.microsoft.com/technet/security/advisory/935423.mspx" target="_blank"&gt;http://www.microsoft.com/technet/security/advisory/935423.mspx&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Great eWEEK article with AWESOME links:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://securitywatch.eweek.com/exploits_and_attacks/ani_zero_day_takes_new_turns_to_the_ubernasty.html?kc=EWEWEMNL040207EP37A" target="_blank"&gt;http://securitywatch.eweek.com/exploits_and_attacks/ani_zero_day_takes_new_turns_to_the_ubernasty.html?kc=EWEWEMNL040207EP37A&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CSA info is not posted yet but it should be very shortly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ray&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 02 Apr 2007 18:52:20 GMT</pubDate>
    <dc:creator>Raymond Aragon</dc:creator>
    <dc:date>2007-04-02T18:52:20Z</dc:date>
    <item>
      <title>MS .ANI Exploit</title>
      <link>https://community.cisco.com/t5/network-security/ms-ani-exploit/m-p/766288#M87107</link>
      <description>&lt;P&gt;Snort and ISS have had a signature for this since 2005.  Lots of other products appear to detect this as of 2005 as well. Where is the Cisco sig?  I found a default disabled/retired sig, (3718-0, Windows .ANI File DoS), but it doesn't appear to work against the latest exploits.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 10:32:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ms-ani-exploit/m-p/766288#M87107</guid>
      <dc:creator>mhellman</dc:creator>
      <dc:date>2019-03-10T10:32:40Z</dc:date>
    </item>
    <item>
      <title>Re: MS .ANI Exploit</title>
      <link>https://community.cisco.com/t5/network-security/ms-ani-exploit/m-p/766289#M87109</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Signature 5442-0. Available since s137 (January 2005)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Linked and visible from MySDN:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://tools.cisco.com/MySDN/Intelligence/viewThreat.x?threatId=5384" target="_blank"&gt;http://tools.cisco.com/MySDN/Intelligence/viewThreat.x?threatId=5384&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So far, this fires against all exploits I've seen.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 31 Mar 2007 21:40:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ms-ani-exploit/m-p/766289#M87109</guid>
      <dc:creator>wsulym</dc:creator>
      <dc:date>2007-03-31T21:40:16Z</dc:date>
    </item>
    <item>
      <title>Re: MS .ANI Exploit</title>
      <link>https://community.cisco.com/t5/network-security/ms-ani-exploit/m-p/766290#M87110</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please check the My Self Defending Network link:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.mysdn.com" target="_blank"&gt;www.mysdn.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is currently at the top of the page and can be searched for.  Here is the Cisco ID: 5384 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pleas use the MYSDN website for security information ther is some good info there.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Ray&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Apr 2007 17:56:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ms-ani-exploit/m-p/766290#M87110</guid>
      <dc:creator>Raymond Aragon</dc:creator>
      <dc:date>2007-04-02T17:56:11Z</dc:date>
    </item>
    <item>
      <title>Re: MS .ANI Exploit</title>
      <link>https://community.cisco.com/t5/network-security/ms-ani-exploit/m-p/766291#M87112</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;BTW:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco Security Agent has shown to protect against this exploit.  It offers some good protection against many DAY Zero exploits without the need for patching per exploit like many AV applications.  It works well with AV and is not a replacement for AV.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ray&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Apr 2007 17:57:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ms-ani-exploit/m-p/766291#M87112</guid>
      <dc:creator>Raymond Aragon</dc:creator>
      <dc:date>2007-04-02T17:57:53Z</dc:date>
    </item>
    <item>
      <title>Re: MS .ANI Exploit</title>
      <link>https://community.cisco.com/t5/network-security/ms-ani-exploit/m-p/766292#M87115</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Ray, where is this explained in detail?  I'd like to show it to some folks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I could not find it listed among the security bulletins here:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/sw/secursw/ps5057/prod_bulletins_list.html" target="_blank"&gt;http://www.cisco.com/en/US/products/sw/secursw/ps5057/prod_bulletins_list.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tom&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Apr 2007 18:27:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ms-ani-exploit/m-p/766292#M87115</guid>
      <dc:creator>tsteger1</dc:creator>
      <dc:date>2007-04-02T18:27:41Z</dc:date>
    </item>
    <item>
      <title>Re: MS .ANI Exploit</title>
      <link>https://community.cisco.com/t5/network-security/ms-ani-exploit/m-p/766293#M87116</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok well first off the signature has information you can review:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://tools.cisco.com/MySDN/Intelligence/viewThreat.x?threatId=5384" target="_blank"&gt;http://tools.cisco.com/MySDN/Intelligence/viewThreat.x?threatId=5384&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Updated Microsoft advisory:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.microsoft.com/technet/security/advisory/935423.mspx" target="_blank"&gt;http://www.microsoft.com/technet/security/advisory/935423.mspx&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Great eWEEK article with AWESOME links:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://securitywatch.eweek.com/exploits_and_attacks/ani_zero_day_takes_new_turns_to_the_ubernasty.html?kc=EWEWEMNL040207EP37A" target="_blank"&gt;http://securitywatch.eweek.com/exploits_and_attacks/ani_zero_day_takes_new_turns_to_the_ubernasty.html?kc=EWEWEMNL040207EP37A&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CSA info is not posted yet but it should be very shortly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ray&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Apr 2007 18:52:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ms-ani-exploit/m-p/766293#M87116</guid>
      <dc:creator>Raymond Aragon</dc:creator>
      <dc:date>2007-04-02T18:52:20Z</dc:date>
    </item>
  </channel>
</rss>

