Tuesday, July 7, 2015

Snort Subscriber Rule Set Update for 07/07/2015, "Hacking Team" Adobe 0day, iOS Lockdown Vulnerability

Just released:
Snort Subscriber Rule Set Update for 07/07/2015


We welcome the introduction of the newest rule release from Talos. In this release we introduced 30 new rules and made modifications to 4 additional rules.

There were no changes made to the snort.conf in this release.

Talos would like to thank the following individuals for their contributions, their rules are included in the Community Ruleset:

Avery Tarasov
35068
35076


Talos's rule release:
Adobe Flash Player Vulnerability: Adobe Flash Player suffers from programming errors that may lead to remote code execution. Rules to detect attacks targeting this vulnerability are included in this release and are identified with GID 1, SIDs 35086 through 35089. 
iOS Lockdown Vulnerability: A programming error exists in iOS Lockdown service that may lead to remote code execution. Rules to detect attacks targeting this vulnerability are included in this release and are identified with GID 1, SIDs 35090 through 35091. 
Talos has also added and modified multiple rules in the blacklist, browser-firefox, exploit-kit, file-flash, malware-cnc, os-mobile and server-webapp rule sets to provide coverage for emerging threats from these technologies.


In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://www.snort.org/products. Make sure and stay up to date to catch the most emerging threats!

No comments:

Post a Comment