Tuesday, October 14, 2014

Snort Subscriber Rule Set Update for 10/14/2014, MSTuesday, Group 72 Coverage

Just released:
Snort Subscriber Rule Set Update for 10/14/2014


We welcome the introduction of the newest rule release from Talos. In this release we introduced 56 new rules and made modifications to 9 additional rules.

There were no changes made to the snort.conf in this release.

Talos would like to thank the following individuals for their contributions, their rules are included in the Community Ruleset:

Avery Tarasov
32130

All detection related to our Group 72 coverage has also been released into the Community Ruleset for free: http://blogs.cisco.com/talos/threat-spotlight-group-72/


Talos's rule release:
Details:
Microsoft Security Bulletin MS14-056:
Microsoft Internet Explorer suffers from programming errors that may
lead to remote code execution.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 32137 through 32138,
32153 through 32164, 32166 through 32169 and 32182 through 32185.

Microsoft Security Bulletin MS14-057:
A coding deficiency exists in Microsoft .NET Framework that may lead to
remote code execution.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 32139 through 32140
and 32149 through 32152.

Microsoft Security Bulletin MS14-058:
A coding deficiency exists in a Microsoft Kernel-Mode driver that may
lead to remote code execution.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 32141 through 32146
and 32190 through 32191.

Microsoft Security Bulletin MS14-059:
A programing error in Microsoft ASP.NET MVC may lead to a security
feature bypass.

A previously released rule will detect attacks targeting this
vulnerability and has been updated with the appropriate reference
information. It is included in this release and is identified with GID
1, SID 7070.

Microsoft Security Bulletin MS14-061:
A coding deficiency exists in Microsoft Word and may lead to remote
code execution.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 32147 through 32148.

The VRT has added and modified multiple rules in the blacklist,
browser-ie, file-identify, file-office, file-other, file-pdf,
malware-backdoor, malware-cnc and policy-other rule sets to provide
coverage for emerging threats from these technologies.

For more details about these Microsoft vulnerabilities, please read our in-depth coverage post here:
http://blogs.cisco.com/talos/microsoft-tuesday-october-2014/


In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://www.snort.org/products. Make sure and stay up to date to catch the most emerging threats!

No comments:

Post a Comment