<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Mercantec Softcart Overflow in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/mercantec-softcart-overflow/m-p/383538#M96624</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If this was on 5.0(1), you might try 5.0(2).  There is a known issue if you tuned some regex based signatures they started to have false positives.  The underlying issue was fixed in 5.0(2).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 15 Apr 2005 17:56:50 GMT</pubDate>
    <dc:creator>scothrel</dc:creator>
    <dc:date>2005-04-15T17:56:50Z</dc:date>
    <item>
      <title>Mercantec Softcart Overflow</title>
      <link>https://community.cisco.com/t5/network-security/mercantec-softcart-overflow/m-p/383532#M96604</link>
      <description>&lt;P&gt;I have recently hooked up a 4240 and found a lot of internal traffic, producing this alarm. SIG ID 5307.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In looking at the packet data it seems to be ligitimate traffic - gmail and others. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The NSDB lists no benign triggers. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does anyone have any other infomation of this signature? Should I just disable it?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 09:22:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mercantec-softcart-overflow/m-p/383532#M96604</guid>
      <dc:creator>HEATH FREEL</dc:creator>
      <dc:date>2019-03-10T09:22:03Z</dc:date>
    </item>
    <item>
      <title>Re: Mercantec Softcart Overflow</title>
      <link>https://community.cisco.com/t5/network-security/mercantec-softcart-overflow/m-p/383533#M96612</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If my memory serves correct, I seem to remember that this signature was buggie in its initial release but has been rectified in one or other signature update.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;what signature update is installed?? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 02 Apr 2005 13:14:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mercantec-softcart-overflow/m-p/383533#M96612</guid>
      <dc:creator>darin.marais</dc:creator>
      <dc:date>2005-04-02T13:14:46Z</dc:date>
    </item>
    <item>
      <title>Re: Mercantec Softcart Overflow</title>
      <link>https://community.cisco.com/t5/network-security/mercantec-softcart-overflow/m-p/383534#M96613</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I tried to search for the bug but did not find it so I could very well be wrong about it being bug prone I may have just confused it with something else, however the signature has been noted in one other thread on this forum.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://forum.cisco.com/eforum/servlet/NetProf?page=netprof&amp;amp;forum=Security&amp;amp;topic=Intrusion%20Prevention%20Systems/IDS&amp;amp;CommCmd=MB%3Fcmd%3Dpass_through%26location%3Doutline%40%5E1%40%40.1dd69fe9" target="_blank"&gt;http://forum.cisco.com/eforum/servlet/NetProf?page=netprof&amp;amp;forum=Security&amp;amp;topic=Intrusion%20Prevention%20Systems/IDS&amp;amp;CommCmd=MB%3Fcmd%3Dpass_through%26location%3Doutline%40%5E1%40%40.1dd69fe9&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 02 Apr 2005 13:39:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mercantec-softcart-overflow/m-p/383534#M96613</guid>
      <dc:creator>darin.marais</dc:creator>
      <dc:date>2005-04-02T13:39:28Z</dc:date>
    </item>
    <item>
      <title>Re: Mercantec Softcart Overflow</title>
      <link>https://community.cisco.com/t5/network-security/mercantec-softcart-overflow/m-p/383535#M96614</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There are no known benign triggers for this signature. Signature 5307 is searching in the URI field for a request to /cgi-bin/softcart.exe with total request length over 500. The URI field in service.http is defined as anything from the GET to the next CRLF. This should prevent most false positives since the signature can only inspect http headers and looks for a large request to /cgi-bin/softcart.exe. If you could provide a traffic sample or captured packet from the suspected traffic it would be very helpful.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Craig&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 02 Apr 2005 20:08:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mercantec-softcart-overflow/m-p/383535#M96614</guid>
      <dc:creator>craiwill</dc:creator>
      <dc:date>2005-04-02T20:08:46Z</dc:date>
    </item>
    <item>
      <title>Re: Mercantec Softcart Overflow</title>
      <link>https://community.cisco.com/t5/network-security/mercantec-softcart-overflow/m-p/383536#M96617</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have attached the captured packet from the details of the alarm. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help is appreciated. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Apr 2005 11:38:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mercantec-softcart-overflow/m-p/383536#M96617</guid>
      <dc:creator>HEATH FREEL</dc:creator>
      <dc:date>2005-04-04T11:38:44Z</dc:date>
    </item>
    <item>
      <title>Re: Mercantec Softcart Overflow</title>
      <link>https://community.cisco.com/t5/network-security/mercantec-softcart-overflow/m-p/383537#M96621</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I do not see anything in this capture that would fire the alarm. It is possible that the call to the softcart executable is too far away from the end of the request and did not make it into the context buffer. What may be happening is that a company  legitimately uses enough arguments on their softcart server to trigger the alarm. If the server from the capture is not running a vulnerable version this would not overflow the server, but it would overflow an older server. Since we really have no way of telling the version of softcart a server is running we cannot check that in the signature. That being said, if you have any captures that include the call to the softcart executable I could tell for sure and may be able to improve our signature. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Craig&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Apr 2005 12:58:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mercantec-softcart-overflow/m-p/383537#M96621</guid>
      <dc:creator>craiwill</dc:creator>
      <dc:date>2005-04-04T12:58:28Z</dc:date>
    </item>
    <item>
      <title>Re: Mercantec Softcart Overflow</title>
      <link>https://community.cisco.com/t5/network-security/mercantec-softcart-overflow/m-p/383538#M96624</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If this was on 5.0(1), you might try 5.0(2).  There is a known issue if you tuned some regex based signatures they started to have false positives.  The underlying issue was fixed in 5.0(2).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Apr 2005 17:56:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mercantec-softcart-overflow/m-p/383538#M96624</guid>
      <dc:creator>scothrel</dc:creator>
      <dc:date>2005-04-15T17:56:50Z</dc:date>
    </item>
  </channel>
</rss>

