<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic TrackerCam PHP Argument Overflow id=5469 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/trackercam-php-argument-overflow-id-5469/m-p/337944#M98168</link>
    <description>&lt;P&gt;I have a 4240 that is alarming on this signature from a number of internal hosts. The hosts have all been checked for Virus, spyware etc. with nothing found. The IPS database indicates that there are no benign triggers. Could this be a false positive?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have attached the alarm.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does anyone have any ideas on how I should handle this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Sun, 10 Mar 2019 09:23:42 GMT</pubDate>
    <dc:creator>HEATH FREEL</dc:creator>
    <dc:date>2019-03-10T09:23:42Z</dc:date>
    <item>
      <title>TrackerCam PHP Argument Overflow id=5469</title>
      <link>https://community.cisco.com/t5/network-security/trackercam-php-argument-overflow-id-5469/m-p/337944#M98168</link>
      <description>&lt;P&gt;I have a 4240 that is alarming on this signature from a number of internal hosts. The hosts have all been checked for Virus, spyware etc. with nothing found. The IPS database indicates that there are no benign triggers. Could this be a false positive?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have attached the alarm.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does anyone have any ideas on how I should handle this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 09:23:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trackercam-php-argument-overflow-id-5469/m-p/337944#M98168</guid>
      <dc:creator>HEATH FREEL</dc:creator>
      <dc:date>2019-03-10T09:23:42Z</dc:date>
    </item>
    <item>
      <title>Re: TrackerCam PHP Argument Overflow id=5469</title>
      <link>https://community.cisco.com/t5/network-security/trackercam-php-argument-overflow-id-5469/m-p/337945#M98170</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Based on your the log you provided, this alarm relates to traffic outbound from your monitored network, (though I noticed you haven't defined your Protected Network, represented by variable $IN, yet) right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The internal system is attempting to connect to IP 66.35.229.217, which does not resolve via an inverse lookup. The whois info says it belongs to Savvis Communications Inc. (savvis.net), which appears to be a web-hosting provider, or a "managed IP services provider" in their own words.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you try to connect a browser to the same destination IP (&lt;A class="jive-link-custom" href="http://66:35.229.217" target="_blank"&gt;http://66:35.229.217&lt;/A&gt;), you're immediately redirected to another site, &lt;A class="jive-link-custom" href="http://www.gatorcorporation.com" target="_blank"&gt;http://www.gatorcorporation.com&lt;/A&gt;, which is blocked by my content filters as a undesirable web site.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This site has some interesting reverse lookup info.&lt;/P&gt;&lt;P&gt;Non-authoritative answer:&lt;/P&gt;&lt;P&gt;Name:    web.balance.gator.COM&lt;/P&gt;&lt;P&gt;Address:  66.35.229.182&lt;/P&gt;&lt;P&gt;Aliases:  &lt;A class="jive-link-custom" href="http://WWW.GATORCORPORATION.COM" target="_blank"&gt;http://WWW.GATORCORPORATION.COM&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It looks like there is a pool of IP addresses that all point back to the alias &lt;A class="jive-link-custom" href="http://www.gatorcorporation.com" target="_blank"&gt;http://www.gatorcorporation.com&lt;/A&gt; to me. Given that, are you sure you don't have some spyware installed?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To answer your original question, yes this looks like a false positive, given what the alarm was supposed to trigger on. That being said, given the info gleaned about the web server involved, you might still want to double-check and make sure that you really aren't impacted by spyware, in light of the "gator" inferences.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this helps,&lt;/P&gt;&lt;P&gt;Alex Arndt&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Apr 2005 13:09:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trackercam-php-argument-overflow-id-5469/m-p/337945#M98170</guid>
      <dc:creator>a.arndt</dc:creator>
      <dc:date>2005-04-13T13:09:57Z</dc:date>
    </item>
    <item>
      <title>Re: TrackerCam PHP Argument Overflow id=5469</title>
      <link>https://community.cisco.com/t5/network-security/trackercam-php-argument-overflow-id-5469/m-p/337946#M98171</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the info. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not sure what you mean by identifiying the protected network. I know what that network is and I have created a number of filters that remove internal network from certain alarms. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The issue is that I see this alarms triggering from multiple internal hosts to multiple external hosts. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Apr 2005 15:13:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trackercam-php-argument-overflow-id-5469/m-p/337946#M98171</guid>
      <dc:creator>HEATH FREEL</dc:creator>
      <dc:date>2005-04-13T15:13:46Z</dc:date>
    </item>
  </channel>
</rss>

