Thursday, December 1, 2011

VRT Rule Update for 12/01/2011

Join us as we welcome the introduction of the newest rule release for today from the VRT. In this release we introduced 36 new rules and made modifications to 773 additional rules.

There were no changes made to the snort.conf in this release.

In VRT's rule release:
Synopsis:
This release adds and modifies rules in several categories.

Details:
The Sourcefire VRT has added and modified multiple rules in the attack-responses, backdoor, bad-traffic, botnet-cnc, deleted, dos, exploit, file-identify, netbios, oracle, rservices, scada, smtp, specific-threats, spyware-put, web-activex, web-client and web-php rule sets to provide coverage for emerging threats from these technologies.

Note:
The fileidentify flowbit group has been removed. This could lead to your local rules no longer working. You must modify local rules using this flowbit group before you can use them in policies.

For example, if you have a rule that uses the fileidentify flowbit group with the following set of options:

flowbits:set,http.mpeg,fileidentify;

You must remove the fileidentify group name for the rule to continue working. The modified rule would then contain the following:

flowbits:set,http.mpeg;

We are also starting to change the names of flowbits to more accurately represent what we are attempting to detect.  For instance, we are changing the names from "http.jpeg" to "file.jpeg".

In order to subscribe now to the VRT's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at http://www.snort.org/store. Make sure and stay up to date to catch the most emerging threats!