<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Event 3327 false positive? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/event-3327-false-positive/m-p/491628#M95368</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;subsig 6&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am using the Threat Analysis Console and you have to right click and show all columns to get the subsig.  Sorry for the delay.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 14 Sep 2005 14:37:54 GMT</pubDate>
    <dc:creator>stith</dc:creator>
    <dc:date>2005-09-14T14:37:54Z</dc:date>
    <item>
      <title>Event 3327 false positive?</title>
      <link>https://community.cisco.com/t5/network-security/event-3327-false-positive/m-p/491622#M95362</link>
      <description>&lt;P&gt;anyone else seeing false positives on event 3327 after installing sig S190?&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 09:37:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/event-3327-false-positive/m-p/491622#M95362</guid>
      <dc:creator>stith</dc:creator>
      <dc:date>2019-03-10T09:37:57Z</dc:date>
    </item>
    <item>
      <title>Re: Event 3327 false positive?</title>
      <link>https://community.cisco.com/t5/network-security/event-3327-false-positive/m-p/491623#M95363</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are you talking about IDS v4.1 or IPS v5.0?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alex Arndt&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Sep 2005 15:08:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/event-3327-false-positive/m-p/491623#M95363</guid>
      <dc:creator>a.arndt</dc:creator>
      <dc:date>2005-09-13T15:08:36Z</dc:date>
    </item>
    <item>
      <title>Re: Event 3327 false positive?</title>
      <link>https://community.cisco.com/t5/network-security/event-3327-false-positive/m-p/491624#M95364</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In addition to the version which subsignature is firing?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Sep 2005 16:35:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/event-3327-false-positive/m-p/491624#M95364</guid>
      <dc:creator>craiwill</dc:creator>
      <dc:date>2005-09-13T16:35:29Z</dc:date>
    </item>
    <item>
      <title>Re: Event 3327 false positive?</title>
      <link>https://community.cisco.com/t5/network-security/event-3327-false-positive/m-p/491625#M95365</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;V5.0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Sep 2005 13:06:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/event-3327-false-positive/m-p/491625#M95365</guid>
      <dc:creator>stith</dc:creator>
      <dc:date>2005-09-14T13:06:29Z</dc:date>
    </item>
    <item>
      <title>Re: Event 3327 false positive?</title>
      <link>https://community.cisco.com/t5/network-security/event-3327-false-positive/m-p/491626#M95366</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;drilling down I don't see the subsig indicated.&lt;/P&gt;&lt;P&gt;How do I determine that?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Sep 2005 13:07:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/event-3327-false-positive/m-p/491626#M95366</guid>
      <dc:creator>stith</dc:creator>
      <dc:date>2005-09-14T13:07:34Z</dc:date>
    </item>
    <item>
      <title>Re: Event 3327 false positive?</title>
      <link>https://community.cisco.com/t5/network-security/event-3327-false-positive/m-p/491627#M95367</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It should be listed near the signature id; the exact location would depend on how you&amp;#146;re getting the alerts (management platform, cli, etc).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Sep 2005 13:56:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/event-3327-false-positive/m-p/491627#M95367</guid>
      <dc:creator>craiwill</dc:creator>
      <dc:date>2005-09-14T13:56:34Z</dc:date>
    </item>
    <item>
      <title>Re: Event 3327 false positive?</title>
      <link>https://community.cisco.com/t5/network-security/event-3327-false-positive/m-p/491628#M95368</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;subsig 6&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am using the Threat Analysis Console and you have to right click and show all columns to get the subsig.  Sorry for the delay.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Sep 2005 14:37:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/event-3327-false-positive/m-p/491628#M95368</guid>
      <dc:creator>stith</dc:creator>
      <dc:date>2005-09-14T14:37:54Z</dc:date>
    </item>
    <item>
      <title>Re: Event 3327 false positive?</title>
      <link>https://community.cisco.com/t5/network-security/event-3327-false-positive/m-p/491629#M95369</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There are no known benign triggers for this signature. If you can provide a traffic sample we should be able to determine if the activity is malicious. The easiest way to do this is to enable capture packet for this signature.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Sep 2005 14:49:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/event-3327-false-positive/m-p/491629#M95369</guid>
      <dc:creator>craiwill</dc:creator>
      <dc:date>2005-09-14T14:49:27Z</dc:date>
    </item>
    <item>
      <title>Re: Event 3327 false positive?</title>
      <link>https://community.cisco.com/t5/network-security/event-3327-false-positive/m-p/491630#M95370</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here are captures from etherpeek and in decode format.  The destination is always a windows AD server.  The source is always an external trusted host ie computers in remote offices using PIX 501's to a VPN3000.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Sep 2005 17:15:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/event-3327-false-positive/m-p/491630#M95370</guid>
      <dc:creator>stith</dc:creator>
      <dc:date>2005-09-15T17:15:13Z</dc:date>
    </item>
    <item>
      <title>Re: Event 3327 false positive?</title>
      <link>https://community.cisco.com/t5/network-security/event-3327-false-positive/m-p/491631#M95371</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There is nothing in this traffic that would cause this signature to fire. Without a traffic sample I cannot say for sure if this is a false positive. There dozens of worms that use this vulnerability as a means of propagation so internal alerts are not necessairly benign. You may want to look for alerts from the 3328-* signatures, they should also fire on most attempts to exploit this vulnerability.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Sep 2005 18:43:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/event-3327-false-positive/m-p/491631#M95371</guid>
      <dc:creator>craiwill</dc:creator>
      <dc:date>2005-09-15T18:43:46Z</dc:date>
    </item>
    <item>
      <title>Re: Event 3327 false positive?</title>
      <link>https://community.cisco.com/t5/network-security/event-3327-false-positive/m-p/491632#M95372</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here's the entire conversation.  No 3328's are firing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Sep 2005 13:26:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/event-3327-false-positive/m-p/491632#M95372</guid>
      <dc:creator>stith</dc:creator>
      <dc:date>2005-09-16T13:26:45Z</dc:date>
    </item>
    <item>
      <title>Re: Event 3327 false positive?</title>
      <link>https://community.cisco.com/t5/network-security/event-3327-false-positive/m-p/491633#M95373</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I believe I am also seeing false positives for this signature, here is a packet capture from 5.0 IDS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;evIdsAlert: eventId=1119908756873907244 severity=high vendor=Cisco&lt;/P&gt;&lt;P&gt;  originator:&lt;/P&gt;&lt;P&gt;    hostId: WSB01&lt;/P&gt;&lt;P&gt;    appName: sensorApp&lt;/P&gt;&lt;P&gt;    appInstanceId: 6801&lt;/P&gt;&lt;P&gt;  time: 2005/09/16 14:04:48 2005/09/16 07:04:48 MST&lt;/P&gt;&lt;P&gt;  signature: description=Windows RPC DCOM Overflow id=3327 version=S188&lt;/P&gt;&lt;P&gt;    subsigId: 6&lt;/P&gt;&lt;P&gt;    sigDetails: \\\x3c400 chars&amp;gt;\&lt;/P&gt;&lt;P&gt;  interfaceGroup:&lt;/P&gt;&lt;P&gt;  vlan: 0&lt;/P&gt;&lt;P&gt;  participants:&lt;/P&gt;&lt;P&gt;    attacker:&lt;/P&gt;&lt;P&gt;      addr: locality=INTERNAL 10.169.99.60&lt;/P&gt;&lt;P&gt;      port: 2034&lt;/P&gt;&lt;P&gt;    target:&lt;/P&gt;&lt;P&gt;      addr: locality=WesternSecurity_Management 10.169.101.20&lt;/P&gt;&lt;P&gt;      port: 445&lt;/P&gt;&lt;P&gt;  context:&lt;/P&gt;&lt;P&gt;    fromTarget:&lt;/P&gt;&lt;P&gt;000000  76 00 30 00 31 00 5C 00  48 00 50 00 20 00 4C 00  v.0.1.\.H.P. .L.&lt;/P&gt;&lt;P&gt;000010  61 00 73 00 65 00 72 00  4A 00 65 00 74 00 20 00  a.s.e.r.J.e.t. .&lt;/P&gt;&lt;P&gt;000020  39 00 30 00 30 00 30 00  20 00 50 00 43 00 4C 00  9.0.0.0. .P.C.L.&lt;/P&gt;&lt;P&gt;000030  20 00 36 00 2C 00 48 00  50 00 20 00 4C 00 61 00   .6.,.H.P. .L.a.&lt;/P&gt;&lt;P&gt;000040  73 00 65 00 72 00 4A 00  65 00 74 00 20 00 39 00  s.e.r.J.e.t. .9.&lt;/P&gt;&lt;P&gt;000050  30 00 30 00 30 00 20 00  50 00 43 00 4C 00 20 00  0.0.0. .P.C.L. .&lt;/P&gt;&lt;P&gt;000060  36 00 2C 00 54 00 69 00  65 00 72 00 72 00 61 00  6.,.T.i.e.r.r.a.&lt;/P&gt;&lt;P&gt;000070  20 00 42 00 75 00 65 00  6E 00 61 00 20 00 48 00   .B.u.e.n.a. .H.&lt;/P&gt;&lt;P&gt;000080  50 00 39 00 30 00 30 00  30 00 00 00 F0 00 00 00  P.9.0.0.0.......&lt;/P&gt;&lt;P&gt;000090  00 00 00 00 00 00 00 68  FF 53 4D 42 25 00 00 00  .......h.SMB%...&lt;/P&gt;&lt;P&gt;0000A0  00 98 07 C8 00 00 DC A1  9A 7B 6A 44 E3 88 00 00  .........{jD....&lt;/P&gt;&lt;P&gt;0000B0  07 B8 C0 03 00 60 82 0B  0A 00 00 30 00 00 00 00  .....`.....0....&lt;/P&gt;&lt;P&gt;0000C0  00 38 00 00 00 30 00 38  00 00 00 00 00 31 00 7C  .8...0.8.....1.|&lt;/P&gt;&lt;P&gt;0000D0  05 00 02 03 10 00 00 00  30 00 00 00 1E 00 00 00  ........0.......&lt;/P&gt;&lt;P&gt;0000E0  18 00 00 00 00 00 00 00  00 00 00 00 62 1B 51 C7  ............b.Q.&lt;/P&gt;&lt;P&gt;0000F0  64 A4 55 47 A6 43 F4 DE  42 89 1C C1 00 00 00 00  d.UG.C..B.......&lt;/P&gt;&lt;P&gt;    fromAttacker:&lt;/P&gt;&lt;P&gt;000000  20 20 20 30 39 2F 31 34  2F 30 35 1B 26 61 35 37     09/14/05.&amp;amp;a57&lt;/P&gt;&lt;P&gt;000010  48 1B 26 61 32 35 33 36  56 20 20 20 20 20 45 4E  H.&amp;amp;a2536V     EN&lt;/P&gt;&lt;P&gt;000020  44 50 4F 49 4E 54 20 4E  55 4D 42 45 52 3A 20 20  DPOINT NUMBER:&lt;/P&gt;&lt;P&gt;000030  20 20 20 20 20 20 20 20  20 20 20 20 20 20 20 20&lt;/P&gt;&lt;P&gt;000040  20 20 20 20 20 20 20 20  20 20 20 20 20 20 20 20&lt;/P&gt;&lt;P&gt;000050  20 20 20 20 20 20 39 31  33 20 20 20 53 45 51 55        913   SEQU&lt;/P&gt;&lt;P&gt;000060  45 4E 43 45 20 4E 55 4D  42 45 52 3A 20 20 20 20  ENCE NUMBER:&lt;/P&gt;&lt;P&gt;000070  20 20 20 20 20 20 20 20  20 20 20 20 20 20 20 20&lt;/P&gt;&lt;P&gt;000080  20 20 20 31 31 37 37 20  20 20 45 58 54 52 41 43     1177   EXTRAC&lt;/P&gt;&lt;P&gt;000090  54 20 4E 55 4D 42 45 52  3A 20 20 20 20 20 20 20  T NUMBER:&lt;/P&gt;&lt;P&gt;0000A0  20 20 20 20 20 20 20 20  20 20 20 20 20 20 20 20&lt;/P&gt;&lt;P&gt;0000B0  20 20 33 35 34 1B 26 61  00 00 00 80 FF 53 4D 42    354.&amp;amp;a.....SMB&lt;/P&gt;&lt;P&gt;0000C0  25 00 00 00 00 18 07 C8  00 00 E6 D6 37 64 86 27  %...........7d.'&lt;/P&gt;&lt;P&gt;0000D0  FC B7 00 00 07 B8 C0 03  00 60 02 0C 10 00 00 2C  .........`.....,&lt;/P&gt;&lt;P&gt;0000E0  00 00 00 70 0E 00 00 00  00 00 00 00 00 00 00 00  ...p............&lt;/P&gt;&lt;P&gt;0000F0  00 54 00 2C 00 54 00 02  00 26 00 02 00 3D 00 10  .T.,.T...&amp;amp;...=..&lt;/P&gt;&lt;P&gt;  riskRatingValue: 65&lt;/P&gt;&lt;P&gt;  interface: fe0_1&lt;/P&gt;&lt;P&gt;  protocol: tcp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Sep 2005 14:28:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/event-3327-false-positive/m-p/491633#M95373</guid>
      <dc:creator>matt_Travis</dc:creator>
      <dc:date>2005-09-16T14:28:54Z</dc:date>
    </item>
    <item>
      <title>Re: Event 3327 false positive?</title>
      <link>https://community.cisco.com/t5/network-security/event-3327-false-positive/m-p/491634#M95374</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for bringing this to our attention. This is indeed a false positive. We research this signature for modification in an upcoming signature update. In the meantime you can either filter out trusted hosts or create a metasignature using this signature as a component to reduce the chance of false positives. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tune signature 3327-6 and remove the produce alert action.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Create a custom signature as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Engine Meta&lt;/P&gt;&lt;P&gt;Component list: &lt;/P&gt;&lt;P&gt;3327-6&lt;/P&gt;&lt;P&gt;3328-0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Meta-reset-interval = 2&lt;/P&gt;&lt;P&gt;Severity high&lt;/P&gt;&lt;P&gt;Summarize&lt;/P&gt;&lt;P&gt;Met-key = Axxx &amp;#150; 1 unique victim&lt;/P&gt;&lt;P&gt;Component-list-in order = false&lt;/P&gt;&lt;P&gt;Event action: produce alert&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This signature will only fire when signatures 3327-6 and 3328-0 fire.  Since 3327-6 would have no event action of its own you would not see alerts from it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note that this signature does not have as high fidelity as the original 3327-6, that being said signature 3327-0 detects almost all public exploits for this vulnerability.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Sep 2005 14:39:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/event-3327-false-positive/m-p/491634#M95374</guid>
      <dc:creator>craiwill</dc:creator>
      <dc:date>2005-09-16T14:39:08Z</dc:date>
    </item>
    <item>
      <title>Re: Event 3327 false positive?</title>
      <link>https://community.cisco.com/t5/network-security/event-3327-false-positive/m-p/491635#M95375</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for sticking with me and getting this resolved. Thank you also for the work arounds.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Sep 2005 16:28:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/event-3327-false-positive/m-p/491635#M95375</guid>
      <dc:creator>stith</dc:creator>
      <dc:date>2005-09-16T16:28:50Z</dc:date>
    </item>
  </channel>
</rss>

