<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: false positive for Windows RPC DCOM Overflow id=3327 version in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/false-positive-for-windows-rpc-dcom-overflow-id-3327-version/m-p/454459#M91328</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is indeed a false positive.  You can either filter out trusted hosts or create a metasignature using this signature as a component to reduce the chance of false positives. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tune signature 3327-6 and remove the produce alert action. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Create a custom signature as follows: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Engine Meta &lt;/P&gt;&lt;P&gt;Component list: &lt;/P&gt;&lt;P&gt;3327-6 &lt;/P&gt;&lt;P&gt;3328-0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Meta-reset-interval = 2 &lt;/P&gt;&lt;P&gt;Severity high &lt;/P&gt;&lt;P&gt;Summarize &lt;/P&gt;&lt;P&gt;Met-key = Axxx &amp;#150; 1 unique victim &lt;/P&gt;&lt;P&gt;Component-list-in order = false &lt;/P&gt;&lt;P&gt;Event action: produce alert &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This signature will only fire when signatures 3327-6 and 3328-0 fire. Since 3327-6 would have no event action of its own you would not see alerts from it. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note that this signature does not have as high fidelity as the original 3327-6, that being said signature 3327-0 detects almost all public exploits for this vulnerability. We will note this in the NSDB.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 26 Oct 2005 12:43:25 GMT</pubDate>
    <dc:creator>craiwill</dc:creator>
    <dc:date>2005-10-26T12:43:25Z</dc:date>
    <item>
      <title>false positive for Windows RPC DCOM Overflow id=3327 version=S188</title>
      <link>https://community.cisco.com/t5/network-security/false-positive-for-windows-rpc-dcom-overflow-id-3327-version/m-p/454458#M91327</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you take a look at the below capture to see if there is false positive at work. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Matt&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  signature: description=Windows RPC DCOM Overflow id=3327 version=S188&lt;/P&gt;&lt;P&gt;    subsigId: 6&lt;/P&gt;&lt;P&gt;    sigDetails: \\\x3c400 chars&amp;gt;\&lt;/P&gt;&lt;P&gt;  interfaceGroup:&lt;/P&gt;&lt;P&gt;  vlan: 0&lt;/P&gt;&lt;P&gt;  participants:&lt;/P&gt;&lt;P&gt;    attacker:&lt;/P&gt;&lt;P&gt;      addr: locality=INTERNAL &amp;lt;address removed&amp;gt;&lt;/P&gt;&lt;P&gt;      port: 1914&lt;/P&gt;&lt;P&gt;    target:&lt;/P&gt;&lt;P&gt;      addr: locality=INTERNAL &amp;lt;address removed&amp;gt;&lt;/P&gt;&lt;P&gt;      port: 445&lt;/P&gt;&lt;P&gt;  context:&lt;/P&gt;&lt;P&gt;    fromTarget:&lt;/P&gt;&lt;P&gt;000000  63 00 5F 00 66 00 73 00  2E 00 6E 00 6F 00 72 00  c._.f.s...n.o.r.&lt;/P&gt;&lt;P&gt;000010  74 00 68 00 62 00 61 00  79 00 62 00 61 00 6E 00  t.h.b.a.y.b.a.n.&lt;/P&gt;&lt;P&gt;000020  63 00 6F 00 72 00 70 00  2E 00 63 00 6F 00 6D 00  c.o.r.p...c.o.m.&lt;/P&gt;&lt;P&gt;000030  00 00 00 00 57 00 69 00  6E 00 64 00 6F 00 77 00  ....W.i.n.d.o.w.&lt;/P&gt;&lt;P&gt;000040  73 00 20 00 35 00 2E 00  30 00 00 00 57 00 69 00  s. .5...0...W.i.&lt;/P&gt;&lt;P&gt;000050  6E 00 64 00 6F 00 77 00  73 00 20 00 32 00 30 00  n.d.o.w.s. .2.0.&lt;/P&gt;&lt;P&gt;000060  30 00 30 00 20 00 4C 00  41 00 4E 00 20 00 4D 00  0.0. .L.A.N. .M.&lt;/P&gt;&lt;P&gt;000070  61 00 6E 00 61 00 67 00  65 00 72 00 00 00 00 00  a.n.a.g.e.r.....&lt;/P&gt;&lt;P&gt;000080  00 7E FF 53 4D 42 73 00  00 00 00 98 07 C8 00 00  .~.SMBs.........&lt;/P&gt;&lt;P&gt;000090  00 00 00 00 00 00 00 00  00 00 00 00 FF FE 00 48  ...............H&lt;/P&gt;&lt;P&gt;0000A0  C0 3E 04 FF 00 7E 00 00  00 09 00 53 00 A1 07 30  .&amp;gt;...~.....S...0&lt;/P&gt;&lt;P&gt;0000B0  05 A0 03 0A 01 00 57 00  69 00 6E 00 64 00 6F 00  ......W.i.n.d.o.&lt;/P&gt;&lt;P&gt;0000C0  77 00 73 00 20 00 35 00  2E 00 30 00 00 00 57 00  w.s. .5...0...W.&lt;/P&gt;&lt;P&gt;0000D0  69 00 6E 00 64 00 6F 00  77 00 73 00 20 00 32 00  i.n.d.o.w.s. .2.&lt;/P&gt;&lt;P&gt;0000E0  30 00 30 00 30 00 20 00  4C 00 41 00 4E 00 20 00  0.0.0. .L.A.N. .&lt;/P&gt;&lt;P&gt;0000F0  4D 00 61 00 6E 00 61 00  67 00 65 00 72 00 00 00  M.a.n.a.g.e.r...&lt;/P&gt;&lt;P&gt;    fromAttacker:&lt;/P&gt;&lt;P&gt;000000  00 04 41 32 00 01 00 00  00 00 00 71 00 00 00 00  ..A2.......q....&lt;/P&gt;&lt;P&gt;000010  00 D4 00 00 80 B9 00 A1  6F 30 6D A2 6B 04 69 4E  ........o0m.k.iN&lt;/P&gt;&lt;P&gt;000020  54 4C 4D 53 53 50 00 03  00 00 00 01 00 01 00 58  TLMSSP.........X&lt;/P&gt;&lt;P&gt;000030  00 00 00 00 00 00 00 59  00 00 00 00 00 00 00 48  .......Y.......H&lt;/P&gt;&lt;P&gt;000040  00 00 00 00 00 00 00 48  00 00 00 10 00 10 00 48  .......H.......H&lt;/P&gt;&lt;P&gt;000050  00 00 00 10 00 10 00 59  00 00 00 15 8A 88 E2 05  .......Y........&lt;/P&gt;&lt;P&gt;000060  00 93 08 00 00 00 0F 47  00 57 00 2D 00 30 00 30  .......G.W.-.0.0&lt;/P&gt;&lt;P&gt;000070  00 32 00 38 00 37 00 00  46 5A 5E 7D 09 B9 25 FB  .2.8.7..FZ^}..%.&lt;/P&gt;&lt;P&gt;000080  EF 1F 07 DE BD 60 85 13  57 00 69 00 6E 00 64 00  .....`..W.i.n.d.&lt;/P&gt;&lt;P&gt;000090  6F 00 77 00 73 00 20 00  32 00 30 00 30 00 30 00  o.w.s. .2.0.0.0.&lt;/P&gt;&lt;P&gt;0000A0  20 00 32 00 31 00 39 00  35 00 00 00 57 00 69 00   .2.1.9.5...W.i.&lt;/P&gt;&lt;P&gt;0000B0  6E 00 64 00 6F 00 77 00  73 00 20 00 32 00 30 00  n.d.o.w.s. .2.0.&lt;/P&gt;&lt;P&gt;0000C0  30 00 30 00 20 00 35 00  2E 00 30 00 00 00 00 00  0.0. .5...0.....&lt;/P&gt;&lt;P&gt;0000D0  00 00 00 58 FF 53 4D 42  75 00 00 00 00 18 07 C8  ...X.SMBu.......&lt;/P&gt;&lt;P&gt;0000E0  00 00 00 00 00 00 00 00  00 00 00 00 00 00 FF FE  ................&lt;/P&gt;&lt;P&gt;0000F0  00 48 00 3F 04 FF 00 58  00 08 00 01 00 2D 00 00  .H.?...X.....-..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 09:42:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/false-positive-for-windows-rpc-dcom-overflow-id-3327-version/m-p/454458#M91327</guid>
      <dc:creator>matt_Travis</dc:creator>
      <dc:date>2019-03-10T09:42:52Z</dc:date>
    </item>
    <item>
      <title>Re: false positive for Windows RPC DCOM Overflow id=3327 version</title>
      <link>https://community.cisco.com/t5/network-security/false-positive-for-windows-rpc-dcom-overflow-id-3327-version/m-p/454459#M91328</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is indeed a false positive.  You can either filter out trusted hosts or create a metasignature using this signature as a component to reduce the chance of false positives. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tune signature 3327-6 and remove the produce alert action. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Create a custom signature as follows: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Engine Meta &lt;/P&gt;&lt;P&gt;Component list: &lt;/P&gt;&lt;P&gt;3327-6 &lt;/P&gt;&lt;P&gt;3328-0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Meta-reset-interval = 2 &lt;/P&gt;&lt;P&gt;Severity high &lt;/P&gt;&lt;P&gt;Summarize &lt;/P&gt;&lt;P&gt;Met-key = Axxx &amp;#150; 1 unique victim &lt;/P&gt;&lt;P&gt;Component-list-in order = false &lt;/P&gt;&lt;P&gt;Event action: produce alert &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This signature will only fire when signatures 3327-6 and 3328-0 fire. Since 3327-6 would have no event action of its own you would not see alerts from it. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note that this signature does not have as high fidelity as the original 3327-6, that being said signature 3327-0 detects almost all public exploits for this vulnerability. We will note this in the NSDB.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 26 Oct 2005 12:43:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/false-positive-for-windows-rpc-dcom-overflow-id-3327-version/m-p/454459#M91328</guid>
      <dc:creator>craiwill</dc:creator>
      <dc:date>2005-10-26T12:43:25Z</dc:date>
    </item>
  </channel>
</rss>

