Thursday, January 29, 2015

Snort Subscriber Rule Set Update for 01/29/2015, Glibc (GHOST) Vulnerability

Just released:
Snort Subscriber Rule Set Update for 01/29/2015

We welcome the introduction of the newest rule release from Talos. In this release we introduced 58 new rules and made modifications to 16 additional rules.

There were no changes made to the snort.conf in this release.

Talos would like to thank the following individuals for their contributions, their rules are included in the Community Ruleset:

Avery Tarasov
33219
33224
33227
33228

Yaser Mansour
33220
33221
33222
33223

Talos's rule release:
Synopsis: The VRT is aware of vulnerabilities affecting products using the GNU C
Library (Glibc).

Details:
CVE-2015-0235:
Exim mail server is exposed to a vulnerability in the GNU C Library
(Glibc) that may lead to remote code execution.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 33225 through 33226.

Talos has added and modified multiple rules in the blacklist,
deleted, exploit-kit, file-flash, indicator-compromise, malware-cnc and
server-webapp rule sets to provide coverage for emerging threats from
these technologies.


In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://www.snort.org/products. Make sure and stay up to date to catch the most emerging threats!

No comments:

Post a Comment