Snort mailing list archives

Snort Subscriber Rules Update 2023-10-10


From: Research <research () sourcefire com>
Date: Tue, 10 Oct 2023 22:33:50 GMT

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Talos Snort Subscriber Rules Update

Synopsis:
Talos is aware of vulnerabilities affecting products from Microsoft
Corporation.

Details:
Microsoft Vulnerability CVE-2023-36594:
A coding deficiency exists in Microsoft Windows Graphics Component that
may lead to an escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with:
Snort 2: GID 1, SIDs 62486 through 62487,
Snort 3: GID 1, SID 300719.

Microsoft Vulnerability CVE-2023-36713:
A coding deficiency exists in Microsoft Windows Common Log File System
Driver that may lead to an information disclosure.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with:
Snort 2: GID 1, SIDs 62488 through 62489,
Snort 3: GID 1, SID 300720.

Microsoft Vulnerability CVE-2023-36731:
A coding deficiency exists in Microsoft Win32k that may lead to an
escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with:
Snort 2: GID 1, SIDs 62486 through 62487,
Snort 3: GID 1, SID 300719.

Microsoft Vulnerability CVE-2023-36743:
A coding deficiency exists in Microsoft Win32k that may lead to an
escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with:
Snort 2: GID 1, SIDs 62508 through 62509,
Snort 3: GID 1, SID 300725.

Microsoft Vulnerability CVE-2023-36776:
A coding deficiency exists in Microsoft Win32k that may lead to an
escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with:
Snort 2: GID 1, SIDs 62490 through 62491,
Snort 3: GID 1, SID 300721.

Microsoft Vulnerability CVE-2023-38159:
A coding deficiency exists in Microsoft Windows Graphics Component that
may lead to an escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with:
Snort 2: GID 1, SIDs 62492 through 62493,
Snort 3: GID 1, SID 300722.

Microsoft Vulnerability CVE-2023-41772:
A coding deficiency exists in Microsoft Win32k that may lead to an
escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with:
Snort 2: GID 1, SIDs 62510 through 62511,
Snort 3: GID 1, SID 300726.


Talos has added and modified multiple rules in the browser-webkit,
file-pdf, os-windows and server-webapp rule sets to provide coverage
for emerging threats from these technologies.


For a complete list of new and modified rules please see:

https://www.snort.org/advisories
-----BEGIN PGP SIGNATURE-----
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=4LbR
-----END PGP SIGNATURE-----

_______________________________________________
Snort-sigs mailing list
Snort-sigs () lists snort org
https://lists.snort.org/mailman/listinfo/snort-sigs

Please visit http://blog.snort.org for the latest news about Snort!

Please follow these rules: https://snort.org/faq/what-is-the-mailing-list-etiquette

Visit the Snort.org to subscribe to the official Snort ruleset, make sure to stay up to date to catch the most <a 
href=" https://snort.org/downloads/#rule-downloads";>emerging threats</a>!


Current thread: