Snort mailing list archives

Snort Subscriber Rules Update 2017-01-10


From: Research <research () sourcefire com>
Date: Tue, 10 Jan 2017 18:33:50 GMT

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Talos Snort Subscriber Rules Update

Synopsis:
Talos is aware of vulnerabilities affecting products from Microsoft
Corporation.

Details:
Microsoft Security Bulletin MS17-002:

A coding deficiency exists in Microsoft Office that may lead to remote
code execution.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 41140 through 41141.

Microsoft Security Bulletin MS17-004:
A coding deficiency exists in Local Security Authority Subsystem
Service (LSASS) that may lead to a Denial of Service (DoS).

A previously released rule will detect attacks targeting these
vulnerabilities and has been updated with the appropriate reference
information. It is included in this release and is identified with GID
1, SID 40759.

Talos has added and modified multiple rules in the blacklist,
browser-ie, file-executable, file-flash, file-image, file-office,
file-other, file-pdf, malware-cnc, netbios, os-windows, policy-other
and server-webapp rule sets to provide coverage for emerging threats
from these technologies.


For a complete list of new and modified rules please see:

https://www.snort.org/advisories
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iEYEARECAAYFAlh1KQ0ACgkQs9U0LCYEKaDMSwCePWAK+/NNJiK/RjOt+3CZ2aNR
dNAAnRnnKBB+qmMU6JfjGxuuPDWJ+7o7
=yoE7
-----END PGP SIGNATURE-----


------------------------------------------------------------------------------
Developer Access Program for Intel Xeon Phi Processors
Access to Intel Xeon Phi processor-based developer platforms.
With one year of Intel Parallel Studio XE.
Training and support from Colfax.
Order your platform today. http://sdm.link/xeonphi
_______________________________________________
Snort-sigs mailing list
Snort-sigs () lists sourceforge net
https://lists.sourceforge.net/lists/listinfo/snort-sigs

http://www.snort.org

Please visit http://blog.snort.org for the latest news about Snort!

Visit the Snort.org to subscribe to the official Snort ruleset, make sure to stay up to date to catch the most <a 
href=" https://snort.org/downloads/#rule-downloads";>emerging threats</a>!


Current thread: