Snort mailing list archives
Snort Subscriber Rules Update 2020-09-08
From: Research <research () sourcefire com>
Date: Tue, 8 Sep 2020 20:25:11 GMT
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Talos Snort Subscriber Rules Update Synopsis: Talos is aware of vulnerabilities affecting products from Microsoft Corporation. Details: Microsoft Vulnerability CVE-2020-0664: A coding deficiency exists in Active Directory that may lead to information disclosure. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with GID 1, SIDs 55139 through 55140. Microsoft Vulnerability CVE-2020-0856: A coding deficiency exists in Active Directory that may lead to information disclosure. A rule to detect attacks targeting this vulnerability is included in this release and is identified with GID 1, SID 55206. Microsoft Vulnerability CVE-2020-0941: A coding deficiency exists in Microsoft Win32k that may lead to information disclosure. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with GID 1, SIDs 55187 through 55188. Microsoft Vulnerability CVE-2020-1115: A coding deficiency exists in Microsoft Windows Common Log File System driver that may lead to an escalation of privilege. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with GID 1, SIDs 55141 through 55142. Microsoft Vulnerability CVE-2020-1152: A coding deficiency exists in Microsoft Win32k that may lead to an escalation of privilege. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with GID 1, SIDs 55161 through 55162. Microsoft Vulnerability CVE-2020-1245: A coding deficiency exists in Microsoft Win32k that may lead to an escalation of privilege. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with GID 1, SIDs 55143 through 55144. Microsoft Vulnerability CVE-2020-1308: A coding deficiency exists in DirectX that may lead to an escalation of privilege. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with GID 1, SIDs 55145 through 55146. Talos also has added and modified multiple rules in the browser-chrome, file-other, malware-cnc, malware-other, os-windows, policy-other and server-webapp rule sets to provide coverage for emerging threats from these technologies. For a complete list of new and modified rules please see: https://www.snort.org/advisories -----BEGIN PGP SIGNATURE----- iQIcBAEBAgAGBQJfV+ilAAoJEPE/nha8pb+tMXAQALM0AT01ngBxV6aYRoepQ155 H7XJHP+IreibrUTIjPAcBHQSZw1iJjMJNO170Ea08VVlmAa4qFPoe66BC/O7S+4v UAAYEorwGd5FxPgXu2IgS260EBn1zbByMPow37uBpVNXm381WtoUm/ow5qaIZmN5 zzt+0MFiFs1hPAgGMuTYOrfe6RoYaFB8moLoBtqDB3KoXRLmmJOaIX2orSX4WBZh KtMnx+UnNlvsVwTKPwvNq7v0/0/BdgYg0vpSW4K7p7Tj6+LtJUbls1xEKfW/UZ63 ZaS7BEPhKfzT8BpACG2pv4Y9trxToX8Oi+emX322tIgiNTgo5f4T5MurKwu1uW/9 fdSfuvEr8j1VfqPuRtVPW6QSpt+fNThaKMCjkMJPZJRAh8IFrXHeafIIhnx1/mfs q3a1nxBu1Ro7x+V4+3dV5BXwNB7TJXTQVYy7wwEuQAFw0v2nmY1p9YcoevNU9bfs cPFPxqmC9GcSEVhKHj/AnSJftRNradbPHpIrXCSs1M+DIcvdlstPbBzgVL3aB5xH JUiNY5KHrgc/UnKd0e3zgwFRrUY8JzSHvi88eRlIkwQ2e8MPd7w4qwt0X4e2qmTE 8W0agTJYCiNPnkS9odWERdhXcXq5Ju88Pl9cjRfCi2+BXyfolqSGvK3m+02nfvf2 UsDqxj53SCI0tY2ASt5n =p6Uo -----END PGP SIGNATURE----- _______________________________________________ Snort-sigs mailing list Snort-sigs () lists snort org https://lists.snort.org/mailman/listinfo/snort-sigs Please visit http://blog.snort.org for the latest news about Snort! Please follow these rules: https://snort.org/faq/what-is-the-mailing-list-etiquette Visit the Snort.org to subscribe to the official Snort ruleset, make sure to stay up to date to catch the most <a href=" https://snort.org/downloads/#rule-downloads">emerging threats</a>!
Current thread:
- Snort Subscriber Rules Update 2020-09-08 Research (Sep 08)