Tuesday, January 10, 2012

VRT Rule Update for 01/10/2012, MS Tuesday

Join us as we welcome the introduction of the newest rule release for today from the VRT. In this release we introduced 94 new rules and made modifications to 273 additional rules.

There were no changes made to the snort.conf in this release.

In VRT's rule release:
Synopsis:
The Sourcefire VRT is aware of vulnerabilities affecting products from
Microsoft Corporation and Adobe Inc.

Details:
Microsoft Security Advisory MS12-002:
Microsoft Windows contains a programming error that may allow a remote
attacker to execute code on an affected system.

Rules to detect attacks targeting this vulnerability are included in
this release and are identified with GID 1, SIDs 20878 and 20879.

Microsoft Security Advisory MS12-004:
The Microsoft Windows Media Player contains vulnerabilities that may
allow a remote attacker to execute code on an affected system.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 20880 and 20900.

Microsoft Security Advisory MS12-005:
The Microsoft Object Linking and Embedding engine contains a
vulnerability that may allow a remote attacker to execute code on an
affected system.

Rules to detect attacks targeting this vulnerability are included in
this release and are identified with GID 1, SIDs 20881 through 20883.

Microsoft Security Advisory MS12-006:
The SSL CBC encryption algorithm contains a programming error that may
lead to information disclosure.

A rule to detect attacks targeting this vulnerability is included in
this release and is identified with GID 1, SID 20212.

Microsoft Security Advisory MS12-007:
The Microsoft Anti-Cross Site Scripting Library contains a programming
error that may allow a remote attacker to execute code on an affected
system.

A rule to detect attacks targeting this vulnerability is included in
this release and is identified with GID 1, SID 20884.

Adobe Security Bulletin APSB12-01:
Adobe Acrobat and Reader contain programming errors that may allow a
remote attacker to execute code on an affected system.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 20919 through 20923.

Additionally this release contains new and modified rules in the
backdoor, blacklist, botnet-cnc, dos, exploit, file-identify, misc,
multimedia, netbios, policy, snmp, specific-threats, sql, web-activex,
web-client and web-misc rule sets to provide coverage for emerging
threats from these technologies.

In order to subscribe now to the VRT's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at http://www.snort.org/store. Make sure and stay up to date to catch the most emerging threats!