Wednesday, May 17, 2017

Snort 2.9.7.6 is *now* EOL!

Even though we announced the EOL of 2.9.7.6 back in March,  we kept 2.9.7.6 around for while to help the people that could not move off of 2.9.7.6 immediately.

However, our download count for 2.9.7.6 is down to "hey, I forgot about this install" levels, so we've removed the build from our package distribution.

In the near future we will have an announcement about adjusting our EOL schedule to better serve the community.  Keep your eyes on this blog!

WannaCry coverage infographic

We created an infographic to illustrate our coverage for the WannaCry Ransomware for another group, and we thought that the Snort community would love to have this as well



For more information on our coverage for WannaCry, check it out here.

Snort Subscriber Rule Set Update for 05/17/2017

Just released:
Snort Subscriber Rule Set Update for 05/17/2017


We welcome the introduction of the newest rule release from Talos. In this release we introduced 19 new rules of which 1 are Shared Object rules and made modifications to 72 additional rules of which 9 are Shared Object rules.

There were no changes made to the snort.conf in this release.

Talos's rule release:
Talos has added and modified multiple rules in the browser-plugins, file-identify, malware-cnc, policy-other and server-webapp rule sets to provide coverage for emerging threats from these technologies.


In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://snort.org/products#rule_subscriptions. Make sure and stay up to date to catch the most emerging threats!

Tuesday, May 16, 2017

Snort Subscriber Rule Set Update for 05/16/2017

Just released:
Snort Subscriber Rule Set Update for 05/16/2017


We welcome the introduction of the newest rule release from Talos. In this release we introduced 63 new rules of which 0 are Shared Object rules and made modifications to 10 additional rules of which 2 are Shared Object rules.

There were no changes made to the snort.conf in this release.



Talos's rule release:
Talos has added and modified multiple rules in the blacklist, browser-plugins, exploit-kit, file-image, file-office, file-other, file-pdf, malware-cnc, os-windows, protocol-ftp, protocol-scada and server-webapp rule sets to provide coverage for emerging threats from these technologies.


In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://snort.org/products#rule_subscriptions. Make sure and stay up to date to catch the most emerging threats!

Friday, May 12, 2017

WannaCry Snort coverage

Lots of news out there this evening about a new Ransomware with auto-propogation ability. Please see our Talos blog post here: http://blog.talosintelligence.com/2017/05/wannacry.html

We have Snort coverage available in the form of rules:
42329-42332, 42340, 41978

This coverage is available in our Snort Subscriber Rule Set.

In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://snort.org/products#rule_subscriptions.

Snort++ Vulnerabilities Found

Thanks go to Bhargava Shastry, who reported several issues to the Snort Team on Github for which two CVEs will be created.  Links to the issues on github are given at the end.  Fixes are on github now, tagged BUILD_233.  The bugs afflict all prior versions so please pull the latest.  Here is a description of the problems:

Ether Type Validation (CVE-2017-6657)

Since valid ether type and IP protocol numbers do not overlap, Snort++ stores all protocol decoders in a singe array.  That makes it possible to craft packets that have IP protocol numbers in the ether type field which will confuse the Snort++ decoder.   For example, an eth:llc:snap:icmp6 packet will cause a crash because there is no ip6 header with which to calculate the icmp6 checksum.  Affected decoders include gre, llc, trans_bridge, ciscometadata, linux_sll, and token_ring.  The fix adds a check in the packet manager to validate the ether type before indexing the decoder array.  An out of range ether type will will raise 116:473.

Buffer Overread (CVE-2017-6658)

Another problem with the decoder array was also discovered.  The size was off by one making it possible read past the end of array with an ether type of 0xFFFF.  Increasing the array size solves this problem.

The links to the github issues are given below.  Thanks again to Bhargava for reporting the issues.

https://github.com/snortadmin/snort3/issues/22
https://github.com/snortadmin/snort3/issues/23
https://github.com/snortadmin/snort3/issues/24
https://github.com/snortadmin/snort3/issues/25
https://github.com/snortadmin/snort3/issues/26
https://github.com/snortadmin/snort3/issues/27


Thursday, May 11, 2017

Snort Subscriber Rule Set Update for 05/11/2017

Just released:
Snort Subscriber Rule Set Update for 05/11/2017


We welcome the introduction of the newest rule release from Talos. In this release we introduced 31 new rules of which 0 are Shared Object rules and made modifications to 45 additional rules of which 1 are Shared Object rules.

There were no changes made to the snort.conf in this release.



Talos's rule release:
Talos has added and modified multiple rules in the blacklist, browser-ie, browser-plugins, exploit-kit, file-flash, file-image, file-java, file-office, file-other, file-pdf, indicator-obfuscation, indicator-shellcode, malware-cnc, malware-other, protocol-dns, protocol-scada and server-webapp rule sets to provide coverage for emerging threats from these technologies.


In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://snort.org/products#rule_subscriptions. Make sure and stay up to date to catch the most emerging threats!