Snort mailing list archives

Snort Subscriber Rules Update 2023-03-15


From: Research <research () sourcefire com>
Date: Wed, 15 Mar 2023 23:42:11 GMT

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Talos Snort Subscriber Rules Update

Synopsis:
This release adds and modifies rules in several categories.

Details:
Talos is releasing coverage for a Microsoft Outlook Escalation of
Privilege vulnerability, CVE-2023-23397. The Snort 2 SIDs for this are
61478-61479, the Snort 3 SID for this is 300464.

Talos also has added and modified multiple rules in the file-image,
file-office, malware-cnc and server-webapp rule sets to provide
coverage for emerging threats from these technologies.


For a complete list of new and modified rules please see:

https://www.snort.org/advisories
-----BEGIN PGP SIGNATURE-----
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=AcBG
-----END PGP SIGNATURE-----

_______________________________________________
Snort-sigs mailing list
Snort-sigs () lists snort org
https://lists.snort.org/mailman/listinfo/snort-sigs

Please visit http://blog.snort.org for the latest news about Snort!

Please follow these rules: https://snort.org/faq/what-is-the-mailing-list-etiquette

Visit the Snort.org to subscribe to the official Snort ruleset, make sure to stay up to date to catch the most <a 
href=" https://snort.org/downloads/#rule-downloads";>emerging threats</a>!


Current thread: