Snort mailing list archives

Snort Subscriber Rules Update 2021-10-12


From: Research <research () sourcefire com>
Date: Tue, 12 Oct 2021 17:27:59 GMT

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Talos Snort Subscriber Rules Update

Synopsis:
Talos is aware of vulnerabilities affecting products from Microsoft
Corporation.

Details:
Microsoft Vulnerability CVE-2021-40443:
A coding deficiency exists in Microsoft Windows Common Log File System
driver that may lead to an escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 58303 through 58304.

Microsoft Vulnerability CVE-2021-40449:
A coding deficiency exists in Microsoft Win32k that may lead to an
escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 58288 through 58289.

Microsoft Vulnerability CVE-2021-40450:
A coding deficiency exists in Microsoft Win32k that may lead to an
escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 58310 through 58313.

Microsoft Vulnerability CVE-2021-40466:
A coding deficiency exists in Microsoft Windows Common Log File System
driver that may lead to an escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 58308 through 58309.

Microsoft Vulnerability CVE-2021-40467:
A coding deficiency exists in Microsoft Windows Common Log File System
driver that may lead to an escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 58305 through 58306.

Microsoft Vulnerability CVE-2021-40470:
A coding deficiency exists in DirectX Graphics Kernel that may lead to
an escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 58294 through 58295.

Microsoft Vulnerability CVE-2021-40487:
A coding deficiency exists in Microsoft SharePoint that may lead to
remote code execution.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 58314 through 58319.

Microsoft Vulnerability CVE-2021-41357:
A coding deficiency exists in Microsoft Win32k that may lead to an
escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 58286 through 58287.

Talos also has added and modified multiple rules in the malware-other,
os-windows, policy-other and server-webapp rule sets to provide
coverage for emerging threats from these technologies.


For a complete list of new and modified rules please see:

https://www.snort.org/advisories
-----BEGIN PGP SIGNATURE-----
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=D6/b
-----END PGP SIGNATURE-----

_______________________________________________
Snort-sigs mailing list
Snort-sigs () lists snort org
https://lists.snort.org/mailman/listinfo/snort-sigs

Please visit http://blog.snort.org for the latest news about Snort!

Please follow these rules: https://snort.org/faq/what-is-the-mailing-list-etiquette

Visit the Snort.org to subscribe to the official Snort ruleset, make sure to stay up to date to catch the most <a 
href=" https://snort.org/downloads/#rule-downloads";>emerging threats</a>!


Current thread: